CN109816535A - Cheat recognition methods, device, computer equipment and storage medium - Google Patents

Cheat recognition methods, device, computer equipment and storage medium Download PDF

Info

Publication number
CN109816535A
CN109816535A CN201811527396.XA CN201811527396A CN109816535A CN 109816535 A CN109816535 A CN 109816535A CN 201811527396 A CN201811527396 A CN 201811527396A CN 109816535 A CN109816535 A CN 109816535A
Authority
CN
China
Prior art keywords
corporations
clustering
matrix
network
point
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811527396.XA
Other languages
Chinese (zh)
Inventor
唐文
侯明远
刘波
黄咏宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Property and Casualty Insurance Company of China Ltd
Original Assignee
Ping An Property and Casualty Insurance Company of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Property and Casualty Insurance Company of China Ltd filed Critical Ping An Property and Casualty Insurance Company of China Ltd
Priority to CN201811527396.XA priority Critical patent/CN109816535A/en
Publication of CN109816535A publication Critical patent/CN109816535A/en
Pending legal-status Critical Current

Links

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses fraud recognition methods, device, computer equipment and storage mediums.This method comprises: obtaining the corresponding node of Claims Resolution data, the corresponding nodal parallel of the Claims Resolution data is divided by multiple subgraphs by spectral clustering;Multiple subgraphs are clustered respectively, obtain network community;The network associate data obtained according to historical data are obtained, if being retrieved in network community in the presence of clustering corporations identical with network associate data point, obtain the clustering corporations point;If corresponding score of the clustering corporations point exceeds preset scoring threshold value, the clustering corporations point is placed in doubtful fraud corporations grouping.The method achieve the full dose data to Claims Resolution data to carry out efficient real-time knitmesh, and is based on community discovery algorithm, finds the doubtful fraud data in Claims Resolution data quickly to be verified.

Description

Cheat recognition methods, device, computer equipment and storage medium
Technical field
The present invention relates to fraud identification technology field more particularly to a kind of fraud recognition methods, device, computer equipment and Storage medium.
Background technique
Currently, there are many common figure knitmesh algorithms, but it is substantially and knitmesh is carried out based on small scale network, does not support simultaneously Row cuts net, fixed-focus operation.For example, there is the product of partial insurance company, it is rule match when being settled a claim, does not support figure Algorithm, community discovery algorithm function.And corporations' algorithm that existing figure knitmesh algorithm is supported is limited, transports in ultra-large data There is disadvantage in calculation (when more than one hundred million nodes, knitmesh speed surpasses 24 hours), and can not support real-time knitmesh operation.
Summary of the invention
The embodiment of the invention provides a kind of fraud recognition methods, device, computer equipment and storage mediums, it is intended to solve Corporations' algorithm that figure knitmesh algorithm is supported in the prior art is limited, the knitmesh inefficiency in ultra-large data operation, and not The problem of supporting real-time knitmesh operation.
In a first aspect, the embodiment of the invention provides a kind of fraud recognition methods comprising:
The corresponding node of Claims Resolution data is obtained, is divided into the corresponding nodal parallel of the Claims Resolution data by spectral clustering more A subgraph;
Multiple subgraphs are clustered respectively, obtain network community;
The network associate data obtained according to historical data are obtained, are existed and the network if being retrieved in network community The identical clustering corporations point of associated data, obtains the clustering corporations point;
If corresponding score of the clustering corporations point exceeds preset scoring threshold value, the clustering corporations point is placed in doubtful It cheats in corporations' grouping.
Second aspect, the embodiment of the invention provides a kind of fraud identification devices comprising:
Subgraph division unit, it is by spectral clustering that the Claims Resolution data are corresponding for obtaining the corresponding node of Claims Resolution data Nodal parallel be divided into multiple subgraphs;
Network community acquiring unit obtains network community for clustering multiple subgraphs respectively;
Clustering corporations point retrieval unit, for obtaining the network associate data obtained according to historical data, if in network society It is retrieved in group in the presence of clustering corporations identical with network associate data point, obtains the clustering corporations point;
Corporations' judging unit is cheated, it, will if exceeding preset scoring threshold value for the corresponding scoring of the clustering corporations point The clustering corporations point is placed in doubtful fraud corporations grouping.
The third aspect, the embodiment of the present invention provide a kind of computer equipment again comprising memory, processor and storage On the memory and the computer program that can run on the processor, the processor execute the computer program Fraud recognition methods described in the above-mentioned first aspect of Shi Shixian.
Fourth aspect, the embodiment of the invention also provides a kind of computer readable storage mediums, wherein the computer can It reads storage medium and is stored with computer program, it is above-mentioned that the computer program when being executed by a processor executes the processor Fraud recognition methods described in first aspect.
The embodiment of the invention provides a kind of fraud recognition methods, device, computer equipment and storage mediums.This method packet The corresponding node of acquisition Claims Resolution data is included, the corresponding nodal parallel of the Claims Resolution data is divided by multiple sons by spectral clustering Figure;Multiple subgraphs are clustered respectively, obtain network community;The network associate data obtained according to historical data are obtained, if It is retrieved in network community in the presence of clustering corporations identical with network associate data point, obtains the clustering corporations point; If corresponding score of the clustering corporations point exceeds preset scoring threshold value, the clustering corporations point is placed in doubtful fraud corporations In grouping.The method achieve the full dose data to Claims Resolution data to carry out efficient real-time knitmesh, and is based on community discovery algorithm, Find the doubtful fraud data in Claims Resolution data quickly to be verified.
Detailed description of the invention
Technical solution in order to illustrate the embodiments of the present invention more clearly, below will be to needed in embodiment description Attached drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the invention, general for this field For logical technical staff, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is the flow diagram of fraud recognition methods provided in an embodiment of the present invention;
Fig. 2 is the sub-process schematic diagram of fraud recognition methods provided in an embodiment of the present invention;
Fig. 3 is another sub-process schematic diagram of fraud recognition methods provided in an embodiment of the present invention;
Fig. 4 is another sub-process schematic diagram of fraud recognition methods provided in an embodiment of the present invention;
Fig. 5 is the schematic block diagram of fraud identification device provided in an embodiment of the present invention;
Fig. 6 is the subelement schematic block diagram of fraud identification device provided in an embodiment of the present invention;
Fig. 7 is another subelement schematic block diagram of fraud identification device provided in an embodiment of the present invention;
Fig. 8 is another subelement schematic block diagram of fraud identification device provided in an embodiment of the present invention;
Fig. 9 is the schematic block diagram of computer equipment provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.
It should be appreciated that ought use in this specification and in the appended claims, term " includes " and "comprising" instruction Described feature, entirety, step, operation, the presence of element and/or component, but one or more of the other feature, whole is not precluded Body, step, operation, the presence or addition of element, component and/or its set.
It is also understood that mesh of the term used in this description of the invention merely for the sake of description specific embodiment And be not intended to limit the present invention.As description of the invention and it is used in the attached claims, unless on Other situations are hereafter clearly indicated, otherwise " one " of singular, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in description of the invention and the appended claims is Refer to any combination and all possible combinations of one or more of associated item listed, and including these combinations.
Referring to Fig. 1, Fig. 1 is the flow diagram of fraud recognition methods provided in an embodiment of the present invention, fraud identification Method is applied in intelligent terminal, and this method is executed by the application software being installed in intelligent terminal.
As shown in Figure 1, the method comprising the steps of S110~S140.
S110, the corresponding node of Claims Resolution data is obtained, is drawn the corresponding nodal parallel of the Claims Resolution data by spectral clustering It is divided into multiple subgraphs.
It in the present embodiment, is that fraud identification is carried out to Claims Resolution data in the management server.When management server receives The case data of magnanimity (such as the case data under vehicle insurance Claims Resolution scene include driver, reporter, beneficiary and the wounded, with And the data such as repair shop, phone number, maintenance place, GPS information), according to prior art medium or small scale network knitmesh, can lead Cause knitmesh inefficiency.At this point it is possible to the division for carrying out region to the node of magnanimity by spectral clustering be selected, so that different The connection weight between node in subgraph (subgraph can be considered as one piece of region, include multiple nodes in the region) is smaller (i.e. It is less than preset connection weight threshold), and the connection weight between the node in same subgraph is larger (i.e. more than preset It is weight threshold).The corresponding nodal parallel of the Claims Resolution data quickly can be divided into multiple subgraphs by spectral clustering.
In one embodiment, as shown in Fig. 2, step S110 includes:
S111, inputted similarity matrix and target clusters number are obtained;
S112, the corresponding similar matrix of corresponding with Claims Resolution data node is constructed according to the similarity matrix;
S113, adjacency matrix and diagonal matrix are constructed according to the similar matrix, by the diagonal matrix and the adjoining The difference of matrix obtains Laplacian Matrix;
S114, the feature that ranking in multiple characteristic values of the Laplacian Matrix is located at before default rank threshold is obtained The corresponding feature vector of value, to obtain target feature vector set;
S115, it is column vector by feature vector transposition each in target feature vector set and successively combines, obtains mesh Mark vector matrix;
S116, row vector each in object vector matrix is clustered by k-means algorithm, is obtained poly- with the target The same number of sub- group of class.
In the present embodiment, spectral clustering is a kind of clustering method based on graph theory, passes through the Laplce to sample data The feature vector of matrix is clustered, to achieve the purpose that cluster sample data.Spectral clustering can be understood as higher-dimension sky Between data be mapped to low-dimensional, then clustered in lower dimensional space with other clustering algorithms (such as k-means).
It, need to be by the corresponding node of the Claims Resolution data in order to realize that the Claims Resolution data to higher dimensional space are mapped to lower dimensional space The building of similar matrix is first carried out according to formula (1):
Wherein, n is to pay for the corresponding node number of data, xiAnd xjAny one node is respectively indicated, σ indicates the mark of node Poor, the s of standardijThen constitute similar matrix.
The corresponding similar matrix of corresponding with Claims Resolution data node is constructed by the similarity matrix inputted ∈- Neighbouring method, K is adjacent to method and full connection method.For example, the calculation formula such as formula 1 of full connection method.
Diagonal matrix is calculated according to formula 2 later, formula 2 is specific as follows:
Wherein, diThe sum of the element for indicating every a line in similar matrix, by diForm diagonal matrix wijThen indicate similar square The element of i-th row jth column in battle array.
After the difference by the diagonal matrix and the adjacency matrix obtains Laplacian Matrix, it can Laplce's square Corresponding each feature vector transposition is column vector in battle array, to form object vector matrix.It will finally by k-means algorithm Each row vector is clustered in object vector matrix, obtains sub- group identical with the target clusters number, passes through spectral clustering reality Show the quick discovery that the full dose data being made of Claims Resolution data are carried out to corporations, and realizes real-time knitmesh.
S120, multiple subgraphs are clustered respectively, obtains network community.
In the present embodiment, multiple subgraphs are clustered respectively again, is a kind of parallel knitmesh, effectively raises big rule The knitmesh efficiency of modulus evidence.After initial node division is formed multiple subgraphs for multiple regions by spectral clustering, form more A lesser figure of scale needs each subgraph carrying out knitmesh at this time.Knitmesh will exactly be connected between node and node with side, side The connection weight between node is represented, the connection weighted value between the more big then node of the incidence relation before two nodes is bigger, Network community can be obtained after carrying out knitmesh to subgraph.
In one embodiment, as shown in figure 3, step S120 includes:
S121, multiple subgraphs are subjected to knitmesh respectively, obtain social networks topological diagram of initially settling a claim;
S122, initial Claims Resolution social networks topological diagram is clustered by corporations' detection, obtains network community.
It in the present embodiment, is after multiple regions form multiple subgraphs, to be formed by initial node division by spectral clustering The lesser figures of multiple scales need each subgraph carrying out knitmesh at this time, obtain social networks topological diagram of initially settling a claim.Later By corporations' detection algorithm, initial Claims Resolution social networks topological diagram can be clustered, obtain network community.
Corporations' detection seeks to (open up comprising the initial Claims Resolution social networks in vertex and side, such as step 1 in a figure Flutter figure) on find community structure, that is, the node in figure is clustered, constitutes corporations one by one.About corporations (community), there is presently no exact definition, it is considered that and the connection between point inside corporations is relatively dense, without It is relatively sparse with the connection between the point of corporations.
For example, a kind of society can be exported after handling by corporations' detection algorithm after the initial Claims Resolution social networks topological diagram of input Group divides, namely cuts the network after figure.
In one embodiment, as shown in figure 4, after step S122 further include:
S123, the corresponding modularity of included each corporations in the network community is obtained;
If S124, the corresponding modularity of each corporations are respectively less than 1, identify the network community and tested by community network division Card;
If S125, thering is the corresponding modularity of corporations to be greater than or equal to 1, identifies the network community and do not drawn by community network Divide verifying, the corporations by corporations' detection to modularity more than or equal to 1 cluster, and obtain updated corporations' network.
In the present embodiment, the modularity (Modularity) of the network after cutting figure is that one community network of assessment divides Bad measure, it is meant that company's number of edges of community's interior nodes and the difference of the number of edges under random case, the value of modularity Range is (0,1).
In corporations' detection algorithm, modularity algorithm mainly assesses the compact concentration of node, can help faster into Row fixed-focus, and in practice, often there is many noises, the image excavation of corporations, therefore can optimize in terms of following three:
A) high-frequency anomaly point is rejected.For the abnormal point of hyperfrequency, often due to typing is abnormal, mistake record phenomenon, lead to height Frequency point is in danger, for such issues that, after we can reject high frequency points, cut net.
B) time shaft is handled, and, by stretching time axis, the case that limit occurs that will can exceed the time limit in the past is filtered for we, from And reduce the complexity of network.
C) business rule combination network module degree is combined and excavates high risk network.
The network associate data that S130, acquisition are obtained according to historical data, exist and institute if retrieving in network community The identical clustering corporations point of network associate data is stated, the clustering corporations point is obtained.
In the present embodiment, it after by the node division of magnanimity for multiple network communities, needs to detect in network community With the presence or absence of clustering identical with network associate data corporations point.Such as according to historical data, corporations' section in the presence of fraud is obtained The structure such as node 1- node 3- node 2- node 4- node 5- node 1 of point (manage by the data that node connection relationship can be formed Solution be network associate data), if that is, there are above-mentioned node connection relationships for node in a certain subgraph, then it represents that in the subgraph In the presence of fraud corporations.It is that whether there is in network community included in each subgraph in the multiple subgraphs of traversal and network associate The identical clustering corporations point of data, if being retrieved in network community in the presence of clustering corporations identical with the network associate data Point obtains the clustering corporations point.
If the corresponding scoring of S140, the clustering corporations point exceeds preset scoring threshold value, the clustering corporations point is set In the grouping of doubtful fraud corporations.
In one embodiment, before step S140 further include:
The connection weight in clustering corporations point between each node is obtained, and the connection weight between each node is carried out Summation, obtains the corresponding scoring of clustering corporations point.
In the present embodiment, when calculating the corresponding scoring of clustering corporations point, preset Weight algorithm can be used, such as count The weight for calculating the clustering corporations point is summed, such as the node structure of clustering corporations point is as follows: node 1- node 3- node 2- section Point 4- node 5- node 1.The weight that contacts between node 1 and node 3 is 0.4, and the weight that contacts between node 3 and node 2 is 0.3, the weight that contacts between node 2 and node 4 is 0.2, and the weight that contacts between node 4 and node 5 is 0.1, node 5 and section Connection weight between point 1 is 0.2, then the sum of above-mentioned connection weight is 1.2, if preset scoring threshold value is 1, the clustering The corresponding scoring of corporations' point exceeds preset scoring threshold value, by the clustering corporations point as in the grouping of doubtful fraud corporations.It is logical It crosses network associate data and is quickly detected fraud corporations as history flag case, and with all the points in clustering corporations Weight is summed to be scored, and more objective be used as further can verify the corporations with the presence or absence of fraud.
The method achieve the full dose data to Claims Resolution data to carry out efficient real-time knitmesh, and is calculated based on community discovery Method finds the doubtful fraud data in Claims Resolution data quickly to be verified.
The embodiment of the present invention also provides a kind of fraud identification device, and the fraud identification device is for executing aforementioned fraud identification Any embodiment of method.Specifically, referring to Fig. 5, Fig. 5 is the schematic of fraud identification device provided in an embodiment of the present invention Block diagram.The fraud identification device 100 can be configured in intelligent terminal.
As shown in figure 5, fraud identification device 100 includes subgraph division unit 110, network community acquiring unit 120, clustering Corporations' point retrieval unit 130, fraud corporations' judging unit 140.
Subgraph division unit 110, for obtaining the corresponding node of Claims Resolution data, by spectral clustering by the Claims Resolution data pair The nodal parallel answered is divided into multiple subgraphs.
It in the present embodiment, is that fraud identification is carried out to Claims Resolution data in the management server.When management server receives The case data of magnanimity (such as the case data under vehicle insurance Claims Resolution scene include driver, reporter, beneficiary and the wounded, with And the data such as repair shop, phone number, maintenance place, GPS information), according to prior art medium or small scale network knitmesh, can lead Cause knitmesh inefficiency.At this point it is possible to the division for carrying out region to the node of magnanimity by spectral clustering be selected, so that different The connection weight between node in subgraph (subgraph can be considered as one piece of region, include multiple nodes in the region) is smaller (i.e. It is less than preset connection weight threshold), and the connection weight between the node in same subgraph is larger (i.e. more than preset It is weight threshold).The corresponding nodal parallel of the Claims Resolution data quickly can be divided into multiple subgraphs by spectral clustering.
In one embodiment, as shown in fig. 6, the subgraph division unit 110 includes:
Initial typing unit 111, for obtaining inputted similarity matrix and target clusters number;
Similar matrix construction unit 112, for constructing section corresponding with the Claims Resolution data according to the similarity matrix The corresponding similar matrix of point;
Laplacian Matrix construction unit 113, for constructing adjacency matrix and diagonal matrix according to the similar matrix, by The difference of the diagonal matrix and the adjacency matrix obtains Laplacian Matrix;
Target feature vector set acquiring unit 114 is arranged in multiple characteristic values for obtaining the Laplacian Matrix Name is located at feature vector corresponding to the characteristic value before presetting rank threshold, to obtain target feature vector set;
Object vector matrix acquiring unit 115, for being column by feature vector transposition each in target feature vector set Vector simultaneously successively combines, to obtain object vector matrix;
Matrix Cluster unit 116, for row vector each in object vector matrix to be clustered by k-means algorithm, Obtain sub- group identical with the target clusters number.
In the present embodiment, spectral clustering is a kind of clustering method based on graph theory, passes through the Laplce to sample data The feature vector of matrix is clustered, to achieve the purpose that cluster sample data.Spectral clustering can be understood as higher-dimension sky Between data be mapped to low-dimensional, then clustered in lower dimensional space with other clustering algorithms (such as k-means).
It, need to be by the corresponding node of the Claims Resolution data in order to realize that the Claims Resolution data to higher dimensional space are mapped to lower dimensional space The building of similar matrix is first carried out according to formula (1):
The corresponding similar matrix of corresponding with Claims Resolution data node is constructed by the similarity matrix inputted ∈- Neighbouring method, K is adjacent to method and full connection method.For example, the calculation formula such as formula 1 of full connection method.
After the difference by the diagonal matrix and the adjacency matrix obtains Laplacian Matrix, it can Laplce's square Corresponding each feature vector transposition is column vector in battle array, to form object vector matrix.It will finally by k-means algorithm Each row vector is clustered in object vector matrix, obtains sub- group identical with the target clusters number, passes through spectral clustering reality Show the quick discovery that the full dose data being made of Claims Resolution data are carried out to corporations, and realizes real-time knitmesh.
Network community acquiring unit 120 obtains network community for clustering multiple subgraphs respectively.
In the present embodiment, multiple subgraphs are clustered respectively again, is a kind of parallel knitmesh, effectively raises big rule The knitmesh efficiency of modulus evidence.After initial node division is formed multiple subgraphs for multiple regions by spectral clustering, form more A lesser figure of scale needs each subgraph carrying out knitmesh at this time.Knitmesh will exactly be connected between node and node with side, side The connection weight between node is represented, the connection weighted value between the more big then node of the incidence relation before two nodes is bigger, Network community can be obtained after carrying out knitmesh to subgraph.
In one embodiment, as shown in fig. 7, the network community acquiring unit 120, comprising:
Initial knitmesh unit 121 obtains social networks topology of initially settling a claim for multiple subgraphs to be carried out knitmesh respectively Figure;
Corporations' detection unit 122 is obtained for being clustered by corporations' detection to initial Claims Resolution social networks topological diagram Network community.
It in the present embodiment, is after multiple regions form multiple subgraphs, to be formed by initial node division by spectral clustering The lesser figures of multiple scales need each subgraph carrying out knitmesh at this time, obtain social networks topological diagram of initially settling a claim.Later By corporations' detection algorithm, initial Claims Resolution social networks topological diagram can be clustered, obtain network community.
Corporations' detection seeks to (open up comprising the initial Claims Resolution social networks in vertex and side, such as step 1 in a figure Flutter figure) on find community structure, that is, the node in figure is clustered, constitutes corporations one by one.About corporations (community), there is presently no exact definition, it is considered that and the connection between point inside corporations is relatively dense, without It is relatively sparse with the connection between the point of corporations.
For example, a kind of society can be exported after handling by corporations' detection algorithm after the initial Claims Resolution social networks topological diagram of input Group divides, namely cuts the network after figure.
In one embodiment, as shown in fig. 7, the network community acquiring unit 120, further includes:
Modularity acquiring unit 123, for obtaining the corresponding modularity of included each corporations in the network community;
It is logical to identify the network community if being respectively less than 1 for the corresponding modularity of each corporations for first identifier unit 124 It crosses community network and divides verifying;
Second identifier unit 125, if identifying the network community for there is the corresponding modularity of corporations to be greater than or equal to 1 It is not divided and is verified by community network, the corporations by corporations' detection to modularity more than or equal to 1 cluster, and are updated Corporations' network afterwards.
In the present embodiment, the modularity (Modularity) of the network after cutting figure is that one community network of assessment divides Bad measure, it is meant that company's number of edges of community's interior nodes and the difference of the number of edges under random case, the value of modularity Range is (0,1).
In corporations' detection algorithm, modularity algorithm mainly assesses the compact concentration of node, can help faster into Row fixed-focus, and in practice, often there is many noises, the image excavation of corporations, therefore can optimize in terms of following three:
A) high-frequency anomaly point is rejected.For the abnormal point of hyperfrequency, often due to typing is abnormal, mistake record phenomenon, lead to height Frequency point is in danger, for such issues that, after we can reject high frequency points, cut net.
B) time shaft is handled, and, by stretching time axis, the case that limit occurs that will can exceed the time limit in the past is filtered for we, from And reduce the complexity of network.
C) business rule combination network module degree is combined and excavates high risk network.
Clustering corporations point retrieval unit 130, for obtaining the network associate data obtained according to historical data, if in network It is retrieved in corporations in the presence of clustering corporations identical with network associate data point, obtains the clustering corporations point.
In the present embodiment, it after by the node division of magnanimity for multiple network communities, needs to detect in network community With the presence or absence of clustering identical with network associate data corporations point.Such as according to historical data, corporations' section in the presence of fraud is obtained The structure such as node 1- node 3- node 2- node 4- node 5- node 1 of point (manage by the data that node connection relationship can be formed Solution be network associate data), if that is, there are above-mentioned node connection relationships for node in a certain subgraph, then it represents that in the subgraph In the presence of fraud corporations.It is that whether there is in network community included in each subgraph in the multiple subgraphs of traversal and network associate The identical clustering corporations point of data, if being retrieved in network community in the presence of clustering corporations identical with the network associate data Point obtains the clustering corporations point.
Corporations' judging unit 140 is cheated, if exceeding preset scoring threshold value for the corresponding scoring of the clustering corporations point, The clustering corporations point is placed in doubtful fraud corporations grouping.
In one embodiment, identification device 100 is cheated further include:
Score computing unit, for obtaining the connection weight in clustering corporations point between each node, and to each node Between connection weight sum, obtain the corresponding scoring of clustering corporations point.
In the present embodiment, when calculating the corresponding scoring of clustering corporations point, preset Weight algorithm can be used, such as count The weight for calculating the clustering corporations point is summed, such as the node structure of clustering corporations point is as follows: node 1- node 3- node 2- section Point 4- node 5- node 1.The weight that contacts between node 1 and node 3 is 0.4, and the weight that contacts between node 3 and node 2 is 0.3, the weight that contacts between node 2 and node 4 is 0.2, and the weight that contacts between node 4 and node 5 is 0.1, node 5 and section Connection weight between point 1 is 0.2, then the sum of above-mentioned connection weight is 1.2, if preset scoring threshold value is 1, the clustering The corresponding scoring of corporations' point exceeds preset scoring threshold value, by the clustering corporations point as in the grouping of doubtful fraud corporations.It is logical It crosses network associate data and is quickly detected fraud corporations as history flag case, and with all the points in clustering corporations Weight is summed to be scored, and more objective be used as further can verify the corporations with the presence or absence of fraud.
The arrangement achieves the full dose data to Claims Resolution data to carry out efficient real-time knitmesh, and is calculated based on community discovery Method finds the doubtful fraud data in Claims Resolution data quickly to be verified.
Above-mentioned fraud identification device can be implemented as the form of computer program, which can be in such as Fig. 9 institute It is run in the computer equipment shown.
Referring to Fig. 9, Fig. 9 is the schematic block diagram of computer equipment provided in an embodiment of the present invention.
Refering to Fig. 9, which includes processor 502, memory and the net connected by system bus 501 Network interface 505, wherein memory may include non-volatile memory medium 503 and built-in storage 504.
The non-volatile memory medium 503 can storage program area 5031 and computer program 5032.The computer program 5032 are performed, and processor 502 may make to execute fraud recognition methods.
The processor 502 supports the operation of entire computer equipment 500 for providing calculating and control ability.
The built-in storage 504 provides environment for the operation of the computer program 5032 in non-volatile memory medium 503, should When computer program 5032 is executed by processor 502, processor 502 may make to execute fraud recognition methods.
The network interface 505 is for carrying out network communication, such as the transmission of offer data information.Those skilled in the art can To understand, structure shown in Fig. 9, only the block diagram of part-structure relevant to the present invention program, is not constituted to this hair The restriction for the computer equipment 500 that bright scheme is applied thereon, specific computer equipment 500 may include than as shown in the figure More or fewer components perhaps combine certain components or with different component layouts.
Wherein, the processor 502 is for running computer program 5032 stored in memory, to realize following function Can: the corresponding node of Claims Resolution data is obtained, the corresponding nodal parallel of the Claims Resolution data is divided by multiple sons by spectral clustering Figure;Multiple subgraphs are clustered respectively, obtain network community;The network associate data obtained according to historical data are obtained, if It is retrieved in network community in the presence of clustering corporations identical with network associate data point, obtains the clustering corporations point; If corresponding score of the clustering corporations point exceeds preset scoring threshold value, the clustering corporations point is placed in doubtful fraud corporations In grouping.
In one embodiment, processor 502 execute it is described by spectral clustering by the corresponding node of the Claims Resolution data simultaneously It when row is divided into the step of multiple subgraphs, performs the following operations: obtaining inputted similarity matrix and target clusters number;Root The corresponding similar matrix of corresponding with Claims Resolution data node is constructed according to the similarity matrix;According to the similar matrix structure Adjacency matrix and diagonal matrix are built, Laplacian Matrix is obtained by the difference of the diagonal matrix and the adjacency matrix;Obtain institute Feature vector corresponding to the characteristic value before ranking in multiple characteristic values of Laplacian Matrix is located at default rank threshold is stated, To obtain target feature vector set;It is column vector and successively group by feature vector transposition each in target feature vector set It closes, to obtain object vector matrix;Row vector each in object vector matrix is clustered by k-means algorithm, obtain with The identical sub- group of the target clusters number.
In one embodiment, processor 502 execute it is described multiple subgraphs are clustered respectively, obtain network community It when step, performs the following operations: multiple subgraphs is subjected to knitmesh respectively, obtain social networks topological diagram of initially settling a claim;Pass through society Group's detection clusters initial Claims Resolution social networks topological diagram, obtains network community.
In one embodiment, processor 502 execute it is described by corporations' detection to social networks topological diagram of initially settling a claim It after the step of being clustered, obtaining network community, performs the following operations: obtaining included each corporations in the network community Corresponding modularity;If the corresponding modularity of each corporations is respectively less than 1, identifies the network community and tested by community network division Card;If there is the corresponding modularity of corporations to be greater than or equal to 1, identifies the network community and verifying is not divided by community network, lead to It crosses corporations of corporations' detection to modularity more than or equal to 1 to cluster, obtains updated corporations' network.
In one embodiment, if processor 502 is executing the corresponding scoring of clustering corporations point beyond preset Score threshold value, and the clustering corporations point is placed in front of the step in the grouping of doubtful fraud corporations, also performs the following operations: obtaining Connection weight in clustering corporations point between each node, and sum to the connection weight between each node, obtain group The corresponding scoring of poly- corporations' point.
It will be understood by those skilled in the art that the embodiment of computer equipment shown in Fig. 9 is not constituted to computer The restriction of equipment specific composition, in other embodiments, computer equipment may include components more more or fewer than diagram, or Person combines certain components or different component layouts.For example, in some embodiments, computer equipment can only include depositing Reservoir and processor, in such embodiments, the structure and function of memory and processor are consistent with embodiment illustrated in fig. 9, Details are not described herein.
It should be appreciated that in embodiments of the present invention, processor 502 can be central processing unit (Central Processing Unit, CPU), which can also be other general processors, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-Programmable GateArray, FPGA) or other programmable logic devices Part, discrete gate or transistor logic, discrete hardware components etc..Wherein, general processor can be microprocessor or The processor is also possible to any conventional processor etc..
Computer readable storage medium is provided in another embodiment of the invention.The computer readable storage medium can be with For non-volatile computer readable storage medium.The computer-readable recording medium storage has computer program, wherein calculating Machine program performs the steps of acquisition Claims Resolution data corresponding node when being executed by processor, by spectral clustering by the Claims Resolution The corresponding nodal parallel of data is divided into multiple subgraphs;Multiple subgraphs are clustered respectively, obtain network community;Obtain basis The network associate data that historical data obtains, if being retrieved in network community in the presence of group identical with the network associate data Poly- corporations' point obtains the clustering corporations point;If corresponding score of the clustering corporations point exceeds preset scoring threshold value, by institute Clustering corporations point is stated to be placed in doubtful fraud corporations grouping.
In one embodiment, described that the corresponding nodal parallel of the Claims Resolution data is divided by multiple sons by spectral clustering Figure, comprising: obtain inputted similarity matrix and target clusters number;According to similarity matrix building and the Claims Resolution The corresponding similar matrix of the corresponding node of data;Adjacency matrix and diagonal matrix are constructed according to the similar matrix, by described right Angular moment battle array and the difference of the adjacency matrix obtain Laplacian Matrix;It obtains and is arranged in multiple characteristic values of the Laplacian Matrix Name is located at feature vector corresponding to the characteristic value before presetting rank threshold, to obtain target feature vector set;By target Each feature vector transposition is column vector and successively combines in feature vector set, to obtain object vector matrix;Pass through k- Means algorithm clusters row vector each in object vector matrix, obtains sub- group identical with the target clusters number.
In one embodiment, described to cluster multiple subgraphs respectively, obtain network community, comprising: by multiple subgraphs Knitmesh is carried out respectively, obtains social networks topological diagram of initially settling a claim;By corporations' detection to initial Claims Resolution social networks topological diagram It is clustered, obtains network community.
In one embodiment, described that initial Claims Resolution social networks topological diagram is clustered by corporations' detection, obtain net Network corporations, further includes: obtain the corresponding modularity of included each corporations in the network community;If the corresponding mould of each corporations Lumpiness is respectively less than 1, identifies the network community by community network and divides verifying;If there is the corresponding modularity of corporations to be greater than or wait It in 1, identifies the network community and verifying is not divided by community network, 1 is greater than or equal to modularity by corporations' detection Corporations are clustered, and updated corporations' network is obtained.
It in one embodiment, will be described if the corresponding scoring of clustering corporations point exceeds preset scoring threshold value Before clustering corporations point is placed in doubtful fraud corporations grouping, further includes: obtain the connection in clustering corporations point between each node It is weight, and sums to the connection weight between each node, obtains the corresponding scoring of clustering corporations point.
It is apparent to those skilled in the art that for convenience of description and succinctly, foregoing description is set The specific work process of standby, device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein. Those of ordinary skill in the art may be aware that unit described in conjunction with the examples disclosed in the embodiments of the present disclosure and algorithm Step can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware and software Interchangeability generally describes each exemplary composition and step according to function in the above description.These functions are studied carefully Unexpectedly the specific application and design constraint depending on technical solution are implemented in hardware or software.Professional technician Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed The scope of the present invention.
In several embodiments provided by the present invention, it should be understood that disclosed unit and method, it can be with It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit It divides, only logical function partition, there may be another division manner in actual implementation, can also will be with the same function Unit set is at a unit, such as multiple units or components can be combined or can be integrated into another system or some Feature can be ignored, or not execute.In addition, shown or discussed mutual coupling, direct-coupling or communication connection can Be through some interfaces, the indirect coupling or communication connection of device or unit, be also possible to electricity, mechanical or other shapes Formula connection.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.Some or all of unit therein can be selected to realize the embodiment of the present invention according to the actual needs Purpose.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, is also possible to two or more units and is integrated in one unit.It is above-mentioned integrated Unit both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product When, it can store in one storage medium.Based on this understanding, technical solution of the present invention is substantially in other words to existing The all or part of part or the technical solution that technology contributes can be embodied in the form of software products, should Computer software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be Personal computer, server or network equipment etc.) execute all or part of step of each embodiment the method for the present invention Suddenly.And storage medium above-mentioned include: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), magnetic disk or The various media that can store program code such as person's CD.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any Those familiar with the art in the technical scope disclosed by the present invention, can readily occur in various equivalent modifications or replace It changes, these modifications or substitutions should be covered by the protection scope of the present invention.Therefore, protection scope of the present invention should be with right It is required that protection scope subject to.

Claims (10)

1. a kind of fraud recognition methods characterized by comprising
The corresponding node of Claims Resolution data is obtained, the corresponding nodal parallel of the Claims Resolution data is divided by multiple sons by spectral clustering Figure;
Multiple subgraphs are clustered respectively, obtain network community;
The network associate data obtained according to historical data are obtained, are existed and the network associate if being retrieved in network community The identical clustering corporations point of data, obtains the clustering corporations point;
If corresponding score of the clustering corporations point exceeds preset scoring threshold value, the clustering corporations point is placed in doubtful fraud In corporations' grouping.
2. fraud recognition methods according to claim 1, which is characterized in that it is described by spectral clustering by the Claims Resolution data Corresponding nodal parallel is divided into multiple subgraphs, comprising:
Obtain inputted similarity matrix and target clusters number;
The corresponding similar matrix of corresponding with Claims Resolution data node is constructed according to the similarity matrix;
Adjacency matrix and diagonal matrix are constructed according to the similar matrix, is obtained by the difference of the diagonal matrix and the adjacency matrix To Laplacian Matrix;
It obtains corresponding to the characteristic value before ranking in multiple characteristic values of the Laplacian Matrix is located at default rank threshold Feature vector, to obtain target feature vector set;
It is column vector by feature vector transposition each in target feature vector set and successively combines, obtains object vector square Battle array;
Row vector each in object vector matrix is clustered by k-means algorithm, is obtained and the target clusters number phase Same son group.
3. fraud recognition methods according to claim 1, which is characterized in that it is described to cluster multiple subgraphs respectively, Obtain network community, comprising:
Multiple subgraphs are subjected to knitmesh respectively, obtain social networks topological diagram of initially settling a claim;
Initial Claims Resolution social networks topological diagram is clustered by corporations' detection, obtains network community.
4. fraud recognition methods according to claim 3, which is characterized in that described to be detected by corporations to initial Claims Resolution society It hands over network topological diagram to be clustered, obtains network community, further includes:
Obtain the corresponding modularity of included each corporations in the network community;
If the corresponding modularity of each corporations is respectively less than 1, identifies the network community and pass through community network and divide verifying;
If there is the corresponding modularity of corporations to be greater than or equal to 1, identifies the network community and verifying is not divided by community network, lead to It crosses corporations of corporations' detection to modularity more than or equal to 1 to cluster, obtains updated corporations' network.
5. fraud recognition methods according to claim 1, which is characterized in that commented if clustering corporations point is corresponding Divide and exceed preset scoring threshold value, before the clustering corporations point is placed in doubtful fraud corporations grouping, further includes:
The connection weight in clustering corporations point between each node is obtained, and the connection weight between each node is asked With obtain the corresponding scoring of clustering corporations point.
6. a kind of fraud identification device characterized by comprising
Subgraph division unit, for obtaining the corresponding node of Claims Resolution data, by spectral clustering by the corresponding section of the Claims Resolution data Point parallel patition is multiple subgraphs;
Network community acquiring unit obtains network community for clustering multiple subgraphs respectively;
Clustering corporations point retrieval unit, for obtaining the network associate data obtained according to historical data, if in network community It retrieves in the presence of clustering corporations identical with network associate data point, obtains the clustering corporations point;
Corporations' judging unit is cheated, it, will be described if exceeding preset scoring threshold value for the corresponding scoring of the clustering corporations point Clustering corporations point is placed in doubtful fraud corporations grouping.
7. fraud identification device according to claim 6, which is characterized in that the subgraph division unit, comprising:
Initial typing unit, for obtaining inputted similarity matrix and target clusters number;
Similar matrix construction unit, it is corresponding for constructing node corresponding with the Claims Resolution data according to the similarity matrix Similar matrix;
Laplacian Matrix construction unit, for constructing adjacency matrix and diagonal matrix according to the similar matrix, by described right Angular moment battle array and the difference of the adjacency matrix obtain Laplacian Matrix;
Target feature vector set acquiring unit, ranking is located at pre- in multiple characteristic values for obtaining the Laplacian Matrix If feature vector corresponding to the characteristic value before rank threshold, to obtain target feature vector set;
Object vector matrix acquiring unit, for by feature vector transposition each in target feature vector set be column vector and according to Secondary combination, to obtain object vector matrix;
Matrix Cluster unit obtains and institute for being clustered row vector each in object vector matrix by k-means algorithm State the identical sub- group of target clusters number.
8. fraud identification device according to claim 6, which is characterized in that the network community acquiring unit, comprising:
Initial knitmesh unit obtains social networks topological diagram of initially settling a claim for multiple subgraphs to be carried out knitmesh respectively;
Corporations' detection unit obtains network society for clustering by corporations' detection to initial Claims Resolution social networks topological diagram Group.
9. a kind of computer equipment, including memory, processor and it is stored on the memory and can be on the processor The computer program of operation, which is characterized in that the processor realizes such as claim 1 to 5 when executing the computer program Any one of described in fraud recognition methods.
10. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has computer journey Sequence, the computer program make the processor execute such as described in any one of claim 1 to 5 take advantage of when being executed by a processor Cheat recognition methods.
CN201811527396.XA 2018-12-13 2018-12-13 Cheat recognition methods, device, computer equipment and storage medium Pending CN109816535A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811527396.XA CN109816535A (en) 2018-12-13 2018-12-13 Cheat recognition methods, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811527396.XA CN109816535A (en) 2018-12-13 2018-12-13 Cheat recognition methods, device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN109816535A true CN109816535A (en) 2019-05-28

Family

ID=66601587

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811527396.XA Pending CN109816535A (en) 2018-12-13 2018-12-13 Cheat recognition methods, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109816535A (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110209660A (en) * 2019-06-10 2019-09-06 北京阿尔山金融科技有限公司 Cheat clique's method for digging, device and electronic equipment
CN110348516A (en) * 2019-07-11 2019-10-18 同盾控股有限公司 Data processing method, device, storage medium and electronic equipment
CN110598128A (en) * 2019-09-11 2019-12-20 西安电子科技大学 Community detection method for large-scale network for resisting Sybil attack
CN110705585A (en) * 2019-08-22 2020-01-17 深圳壹账通智能科技有限公司 Network fraud identification method and device, computer device and storage medium
CN111091287A (en) * 2019-12-13 2020-05-01 南京三百云信息科技有限公司 Risk object identification method and device and computer equipment
CN111259952A (en) * 2020-01-14 2020-06-09 中国平安财产保险股份有限公司 Abnormal user identification method and device, computer equipment and storage medium
CN111612039A (en) * 2020-04-24 2020-09-01 平安直通咨询有限公司上海分公司 Abnormal user identification method and device, storage medium and electronic equipment
CN111641518A (en) * 2020-04-29 2020-09-08 深圳壹账通智能科技有限公司 Heterogeneous network-based community division method and device, computer equipment and medium
CN111711614A (en) * 2020-05-27 2020-09-25 平安科技(深圳)有限公司 Knowledge graph-based suspicious user verification method and device and computer equipment
CN111931023A (en) * 2020-07-01 2020-11-13 西北工业大学 Community structure identification method and device based on network embedding
CN112396160A (en) * 2020-11-02 2021-02-23 北京大学 Transaction fraud detection method and system based on graph neural network
WO2021189730A1 (en) * 2020-03-27 2021-09-30 深圳壹账通智能科技有限公司 Method, apparatus and device for detecting abnormal dense subgraph, and storage medium
CN113487109A (en) * 2021-07-27 2021-10-08 中国平安财产保险股份有限公司 Group identification method and device, electronic equipment and storage medium
CN115293919A (en) * 2022-07-22 2022-11-04 浙江大学 Graph neural network prediction method and system oriented to social network distribution generalization

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105469315A (en) * 2015-08-04 2016-04-06 电子科技大学 Dynamic social network community structure evolution method based on incremental clustering
WO2018103456A1 (en) * 2016-12-06 2018-06-14 中国银联股份有限公司 Method and apparatus for grouping communities on the basis of feature matching network, and electronic device
CN108681936A (en) * 2018-04-26 2018-10-19 浙江邦盛科技有限公司 A kind of fraud clique recognition methods propagated based on modularity and balance label
CN108960335A (en) * 2018-07-13 2018-12-07 大连理工大学 One kind carrying out efficient clustering method based on large scale network

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105469315A (en) * 2015-08-04 2016-04-06 电子科技大学 Dynamic social network community structure evolution method based on incremental clustering
WO2018103456A1 (en) * 2016-12-06 2018-06-14 中国银联股份有限公司 Method and apparatus for grouping communities on the basis of feature matching network, and electronic device
CN108681936A (en) * 2018-04-26 2018-10-19 浙江邦盛科技有限公司 A kind of fraud clique recognition methods propagated based on modularity and balance label
CN108960335A (en) * 2018-07-13 2018-12-07 大连理工大学 One kind carrying out efficient clustering method based on large scale network

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110209660A (en) * 2019-06-10 2019-09-06 北京阿尔山金融科技有限公司 Cheat clique's method for digging, device and electronic equipment
CN110209660B (en) * 2019-06-10 2021-12-24 北京阿尔山金融科技有限公司 Cheating group mining method and device and electronic equipment
CN110348516B (en) * 2019-07-11 2021-05-11 同盾控股有限公司 Data processing method, data processing device, storage medium and electronic equipment
CN110348516A (en) * 2019-07-11 2019-10-18 同盾控股有限公司 Data processing method, device, storage medium and electronic equipment
CN110705585A (en) * 2019-08-22 2020-01-17 深圳壹账通智能科技有限公司 Network fraud identification method and device, computer device and storage medium
CN110598128A (en) * 2019-09-11 2019-12-20 西安电子科技大学 Community detection method for large-scale network for resisting Sybil attack
CN110598128B (en) * 2019-09-11 2022-08-09 西安电子科技大学 Community detection method for large-scale network for resisting Sybil attack
CN111091287A (en) * 2019-12-13 2020-05-01 南京三百云信息科技有限公司 Risk object identification method and device and computer equipment
CN111259952A (en) * 2020-01-14 2020-06-09 中国平安财产保险股份有限公司 Abnormal user identification method and device, computer equipment and storage medium
WO2021189730A1 (en) * 2020-03-27 2021-09-30 深圳壹账通智能科技有限公司 Method, apparatus and device for detecting abnormal dense subgraph, and storage medium
CN111612039A (en) * 2020-04-24 2020-09-01 平安直通咨询有限公司上海分公司 Abnormal user identification method and device, storage medium and electronic equipment
CN111612039B (en) * 2020-04-24 2023-09-29 平安直通咨询有限公司上海分公司 Abnormal user identification method and device, storage medium and electronic equipment
CN111641518A (en) * 2020-04-29 2020-09-08 深圳壹账通智能科技有限公司 Heterogeneous network-based community division method and device, computer equipment and medium
CN111711614A (en) * 2020-05-27 2020-09-25 平安科技(深圳)有限公司 Knowledge graph-based suspicious user verification method and device and computer equipment
CN111931023A (en) * 2020-07-01 2020-11-13 西北工业大学 Community structure identification method and device based on network embedding
CN112396160A (en) * 2020-11-02 2021-02-23 北京大学 Transaction fraud detection method and system based on graph neural network
CN113487109A (en) * 2021-07-27 2021-10-08 中国平安财产保险股份有限公司 Group identification method and device, electronic equipment and storage medium
CN113487109B (en) * 2021-07-27 2023-11-24 中国平安财产保险股份有限公司 Group identification method, group identification device, electronic equipment and storage medium
CN115293919A (en) * 2022-07-22 2022-11-04 浙江大学 Graph neural network prediction method and system oriented to social network distribution generalization
CN115293919B (en) * 2022-07-22 2023-08-04 浙江大学 Social network distribution outward generalization-oriented graph neural network prediction method and system

Similar Documents

Publication Publication Date Title
CN109816535A (en) Cheat recognition methods, device, computer equipment and storage medium
CN109784636A (en) Fraudulent user recognition methods, device, computer equipment and storage medium
CN109859054A (en) Network community method for digging, device, computer equipment and storage medium
CN109598509A (en) The recognition methods of risk clique and device
CN108874927A (en) Intrusion detection method based on hypergraph and random forest
CN106469276B (en) Type identification method and device of data sample
CN108809745A (en) A kind of user's anomaly detection method, apparatus and system
CN111612038B (en) Abnormal user detection method and device, storage medium and electronic equipment
CN110443120A (en) A kind of face identification method and equipment
CN108510396B (en) Method and device for insurance verification, computer equipment and storage medium
CN111596924B (en) Micro-service dividing method and device
CN104517052B (en) Invasion detection method and device
CN106960153B (en) Virus type identification method and device
CN111931047B (en) Artificial intelligence-based black product account detection method and related device
US9529935B2 (en) Efficient link management for graph clustering
CN111460315B (en) Community portrait construction method, device, equipment and storage medium
CN113807940B (en) Information processing and fraud recognition method, device, equipment and storage medium
CN109960839B (en) Service link discovery method and system of service support system based on machine learning
CN114265740A (en) Error information processing method, device, equipment and storage medium
CN109325814A (en) A method of for finding suspicious trade network
CN112241820A (en) Risk identification method and device for key nodes in fund flow and computing equipment
CN108429632B (en) Service monitoring method and device
CN109670976B (en) Feature factor determination method and device
CN109949070A (en) Usage rate of the user appraisal procedure, device, computer equipment and storage medium
CN110427558A (en) The method for pushing and device of Energy Resources Service's director's part

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination