CN110310122B - iOS charging risk control method based on graph structure - Google Patents

iOS charging risk control method based on graph structure Download PDF

Info

Publication number
CN110310122B
CN110310122B CN201910567553.8A CN201910567553A CN110310122B CN 110310122 B CN110310122 B CN 110310122B CN 201910567553 A CN201910567553 A CN 201910567553A CN 110310122 B CN110310122 B CN 110310122B
Authority
CN
China
Prior art keywords
user
charging
substitution
network community
pagerank
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910567553.8A
Other languages
Chinese (zh)
Other versions
CN110310122A (en
Inventor
雷鸣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Microphone Culture Media Co ltd
Original Assignee
Shanghai Microphone Culture Media Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Microphone Culture Media Co ltd filed Critical Shanghai Microphone Culture Media Co ltd
Priority to CN201910567553.8A priority Critical patent/CN110310122B/en
Publication of CN110310122A publication Critical patent/CN110310122A/en
Application granted granted Critical
Publication of CN110310122B publication Critical patent/CN110310122B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/901Indexing; Data structures therefor; Storage structures
    • G06F16/9024Graphs; Linked lists
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • G06F16/90335Query processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The invention provides an iOS charging risk control method based on a graph structure, which comprises the following steps: s1, acquiring substitute charging user data through a substitute charging platform, and performing preliminary filtering and screening on the substitute charging user data; s2, carrying out graphic structure Graph processing on the user data subjected to preliminary filtering and screening, and establishing a graphic structure of a correlation edge between the user data; s3, calculating a pagerank value of each point in the user data graph structure through a pagerank algorithm, and endowing each webpage with an evaluation value indicating the importance degree of the webpage through the algorithm; s4, carrying out a process of finding the substituted charge network community according to the graph structure, and predicting the density degree of each user data in the substituted charge network community according to a semi-supervised learning method; and S5, calculating a pagerank average value of all user data in the network community by substitution, and judging substitution possibility of all user data in the network community by substitution.

Description

iOS charging risk control method based on graph structure
Technical Field
The invention relates to the field of computer network risk control, in particular to an iOS (integrated circuit) substitution risk control method based on a graph structure.
Background
With the rapid development of the mobile internet, many internet companies continuously push out various mobile phone APP, and these internet companies continuously change our lives and simultaneously provide better services for people, wherein the better services include member VIP service, purchasing payment album of content provider, recharging virtual goods of game, etc., more or less the services need to be recharged and paid by users, and the cost is convenient for users and simultaneously promotes the internet companies to push out better contents and services. The APP is mainly mobile phone software running on a mobile terminal, the two systems with the largest market share of the mobile terminal are IOS systems of android and apples, the IOS systems respectively occupy 70% and 30%, when users and the Internet are charged on the mobile terminals of the IOS systems, such as mobile phones, the APP needs to follow payment policies formulated by apple companies, however, in the process of charging in the IOS version, a black-generation charging loophole appears, namely, the users charge by a charging platform for own account to purchase virtual items, such as VIP member services, payment contents or game equipment, and the like, after the virtual items reach account numbers, the charging platform initiates refund application to apple companies, however, the virtual items cannot be cancelled and refund to related Internet companies, the users only need to pay little fees to obtain virtual items with amounts of tens of times through regular channel charging, the charging platform can benefit through charging users' payment, and the apple companies can charge more than 30% of the internet companies in each time through charging, and the related Internet companies can bear huge losses in the whole charging process.
Disclosure of Invention
The invention aims to at least solve the problem that corresponding punishment measures are made for the substitution charging holes in the prior art, mobile internet companies also find some substitution charging behaviors in real time through some rules, for example, judge whether to charge with common equipment, if not, add users into a blacklist, seal numbers for users who are frequently substituted for charging, even shut down a certain server and the like when the loss is serious, and although complex and detailed rules are formulated, the Du Juedai charging phenomenon still cannot occur. All the invention particularly and innovatively provides an iOS charging risk control method based on a graph structure.
In order to achieve the above object of the present invention, the present invention provides an iOS substitution risk control method based on a graph structure, including the steps of:
s1, acquiring substitute charging user data through a substitute charging platform, and performing preliminary filtering and screening on the substitute charging user data;
s2, carrying out graphic structure Graph processing on the user data subjected to preliminary filtering and screening, and establishing a graphic structure of a correlation edge between the user data;
s3, calculating a pagerank value of each point in the user data graph structure through a pagerank algorithm, and endowing each webpage with an evaluation value indicating the importance degree of the webpage through the algorithm;
s4, carrying out a process of finding the substituted charge network community according to the graph structure, and predicting the density degree of each user data in the substituted charge network community according to a semi-supervised learning method;
and S5, calculating a pagerank average value of all user data in the network community by substitution, and judging substitution possibility of all user data in the network community by substitution.
Preferably, the S1 includes:
s1-1, acquiring user data through network data of a substitution charging platform, performing type division according to charging types of the substitution charging platform, and extracting a behavior history log of substitution charging transaction;
s1-2, deleting noise fields contained in a behavior history log of a user substitution transaction, and reserving keyword fields, wherein the keyword fields comprise user ids, namely u_id, user client ips, namely client_ip, equipment ids used by users, namely device_id, recharging amount pay_current and recharging time pay_time;
s1-3, carrying out preliminary filtering screening on the substitute charging user data according to the keyword fields to form the substitute charging user data containing the keyword fields.
Preferably, the S2 includes:
s2-1, preliminarily filtering and screening user data to form a graph structure, wherein user nodes in the graph structure are formed by user u_id;
s2-2, selecting different recharging types of the recharging platform according to user data to form first type data, second type data, third type data and fourth type data, wherein the first type data to the fourth type data are sequentially increased;
s2-3, a user sends recharging requests to different recharging types of a substitution recharging platform, any one type of data from first type data to fourth type data is selected to establish a standard of a graphic structure, if the recharging requests are generated between a first user u_id1 and a second user u_id2 through a shared user client side_ip, and recharging amount pay_amountis greater than or equal to the selected type of data, a directed edge pointing to each other is generated between two user nodes of the first user u_id1 and the second user u_id2;
s2-4, if recharging operation occurs between the first user u_id1 and the second user u_id2 through a shared iOS device, and the recharging amount pay_amountis greater than or equal to the type of data, directional edges pointing to each other are generated between the two user nodes of the first user u_id1 and the second user u_id2; the Graph structure Graph of all recharging users can be constructed by acquiring the behavior history log of the user substitution recharging transaction.
Preferably, the S3 includes:
s3-1, calculating the pagerank value of each point in the Graph structure Graph through a pagerank algorithm, wherein when any user node performs the substitution operation, the pagerank calculates the possibility that the user node reaches a certain generation of charging platform after clicking any time of links, if the more external back-pointing links from other high-clicking-rate substitution charging platforms are possessed by a certain generation of charging platform, the larger the probability that the pointing rate of the user performing the substitution operation reaches the substitution charging platform is, otherwise, the smaller the probability that the pointing rate of the user performing the substitution charging operation reaches the substitution charging platform is;
s3-2, the pagerank algorithm endows each generation charging platform with an evaluation value for indicating the link importance degree of the generation charging platform, and an importance index formed by the high click rate generation charging platform is obtained according to the importance indexes of all other generation charging platforms pointing to the generation charging platform and the link numbers of the generation charging platforms contained in the generation charging platforms;
s3-3, calculating importance indexes, namely pagerank values, for the user u_id in each Graph structure Graph through a pagerank algorithm.
Preferably, the S4 includes:
s4-1, network community discovery is carried out on the Graph structure Graph, semi-supervised learning is carried out through a label propagation algorithm, label information of marked user nodes is utilized to predict label information of unmarked nodes, in the Graph structure Graph, connection of some user nodes is tight, and connection relation among some users is sparse;
s4-2, in the network community of the generation and filling of all user data, the part with the compact connection of the Graph structure is regarded as one network community of the generation and filling, the internal user nodes of the network community are connected more tightly, the part with the sparse connection of the Graph structure is regarded as another network community of the generation and filling, the relative connection of the network communities of the generation and filling is sparse, and the nodes in the Graph structure can be divided into a plurality of network communities of the generation and filling through LPA.
Preferably, the step S5 includes:
s5-1, calculating an average pagerank of each generation charging network community, obtaining a plurality of generation charging network communities which are closely connected respectively through an LPA algorithm after obtaining the importance degree pagerank of each user u_id in a Graph, and obtaining the importance degree label_pagerank of each generation charging network community in the Graph structure Graph by calculating the average value of the pagerank of each user u_id in the generation charging network communities;
s5-2, analyzing the captured substitution charging user data, wherein the substitution charging network community importance index is in direct proportion to the occurrence substitution charging behavior probability of all user u_ids in the substitution charging network community, and the higher the substitution charging network community importance index is, the larger the substitution charging proportion of the user u_ids contained in the substitution charging network community is, and the importance degree label_pagerank of the substitution charging network community can be used as a basis for judging the substitution charging possibility of all the user u_ids in the network community.
Preferably, the method further comprises:
s6, setting a judgment threshold value alpha in a substitution charging platform acquired by the iOS, and judging that all the user u_ids in the substitution charging network community generate substitution charging behaviors when the importance degree label_pagerank of the substitution charging network community is larger than alpha and smaller than alpha, wherein the user u_id in the substitution charging network community is a normal user.
In summary, due to the adoption of the technical scheme, the beneficial effects of the invention are as follows:
by means of the network data mining process, the abnormal account numbers are collected and analyzed, and the problematic abnormal charging account number data information is mined, so that the data analysis mining efficiency is improved, and risks are reduced for the Internet platform.
Additional aspects and advantages of the invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention.
Drawings
The foregoing and/or additional aspects and advantages of the invention will become apparent and may be better understood from the following description of embodiments taken in conjunction with the accompanying drawings in which:
FIG. 1 is a general flow of prior art IOS version APP processing of a charging issue;
FIG. 2 is a diagram structure-based reverse IOS version APP substitution method;
FIG. 3 is a graph showing the distribution of various web communities of different gray colors obtained by using the LPA web community discovery algorithm according to the present invention.
Detailed Description
Embodiments of the present invention are described in detail below, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to like or similar elements or elements having like or similar functions throughout. The embodiments described below by referring to the drawings are illustrative only and are not to be construed as limiting the invention.
As shown in fig. 1 and 2, the method for mining the substitution charging behavior based on the graph structure generally has the defects of being passive, high in delay, low in accuracy and the like by formulating complex rules for filtering, has the advantages of being high in accuracy, high in initiative, capable of coping with variable substitution charging behavior and the like, and is verified in actual use. In order to achieve the above object, the following technical solutions are adopted in the embodiments of the present invention:
step 1, obtaining history logs of recharging of each package in product service through each channel by a user. And deleting useless fields contained in the user recharging log, and reserving main fields including user id (uid), user client ip (client_ip), device id (deviceid) used by a user, recharging amount paymount, recharging time and the like.
Step 2, as shown in fig. 3, a graph structure is established, wherein nodes in the graph structure are formed by user's uid, general member recharging is divided into four packages of level, for example, member recharging is divided into four packages of a, B, C and D, respectively corresponding to four sequentially raised prices of a, B, C and D, considering that the price of package is generally selected to be higher and more profit is obtained when the user finds a substitution recharging platform, here, the price of package C is selected as a standard for establishing the graph structure, if the price of package C is used for recharging through a common client_ip between user's uid1 and uid2, and if the recharging amount payamount is greater than or equal to C, directional edges which are mutually pointed to each other are generated between two nodes of uid1 and uid2, and similarly, if the recharging amount payamount is greater than or equal to C through a common device between user's uid1 and uid2, directional edges which are mutually pointed to each other are generated between two nodes; by acquiring the user recharging history log, graph structures Graph of all recharging users can be constructed.
Step 3, calculating the pagerank value of each point in the Graph through a pagerank algorithm, wherein the pagerank value is calculated by calculating the possibility that a certain person reaches a certain webpage after clicking links for any time, if the certain webpage has more external back finger links from other hot webpages, the probability that a new user clicks to reach the webpage is larger, the algorithm endows each webpage with an evaluation value for indicating the importance degree of the webpage, and the importance of the webpage is obtained according to the importance of all other webpages pointing to the webpage and the number of links contained in the webpages; also, we can calculate the importance level, i.e., the pagerank value, for the points (i.e., uid) in each Graph by the pagerank algorithm.
And 4, performing network community discovery on the Graph, wherein label information of marked nodes is utilized to predict label information of unmarked nodes by using a Graph structure semi-supervised learning method of LPA (Label Propagation, label propagation algorithm), in the Graph, connection of some nodes is tighter, connection relation between some users is sparse, in the Graph network, the part which is more tightly connected can be regarded as a network community, the internal nodes are more tightly connected, and the two network communities are relatively sparsely connected, and finally, the nodes in the Graph can be divided into a plurality of network communities by LPA.
And 5, calculating the average parerank of each network community, after obtaining the importance degree parerank of each user in the graph, obtaining a plurality of network communities which are closely connected by LPA algorithm, and obtaining the importance degree label_parerank of the network community in the graph by calculating the average value of the parerank for all the user in the network community, wherein the importance degree of the network community is in direct proportion to the probability of occurrence of the charging behavior of all the user in the network community according to the analysis found by the captured charging users, and the larger the importance degree of the network community is, the larger the proportion of occurrence of the charging of the user contained in the network community is, namely the label_parerank of the network community can be used as the basis for judging the charging possibility of all the user in the network community.
Step six, setting a threshold value, namely alpha, in actual use, when the label_pagerank of the network community is larger than alpha, the user can judge that all the uid in the network community is in substitution and charging, and when the value is smaller than alpha, the user indicates that the uid in the network community is a normal user, and the user can properly increase or decrease the size of the alpha threshold value according to the strict degree in an actual service scene.
While embodiments of the present invention have been shown and described, it will be understood by those of ordinary skill in the art that: many changes, modifications, substitutions and variations can be made to the embodiments without departing from the spirit and principles of the invention, the scope of which is defined by the claims and their equivalents.

Claims (6)

1. The iOS charging risk control method based on the graph structure is characterized by comprising the following steps of:
s1, acquiring substitute charging user data through a substitute charging platform, and performing preliminary filtering and screening on the substitute charging user data;
s2, carrying out graphic structure Graph processing on the user data subjected to preliminary filtering and screening, and establishing a graphic structure of a correlation edge between the user data;
s3, calculating a pagerank value of each point in the user data graph structure through a pagerank algorithm, and endowing each webpage with an evaluation value indicating the importance degree of the webpage through the algorithm;
s4, carrying out a process of finding the substituted charge network community according to the graph structure, and predicting the density degree of each user data in the substituted charge network community according to a semi-supervised learning method;
s5, judging the substitution possibility of all user data in the substitution network community by calculating a pagerank average value of all user data in the substitution network community;
the S1 comprises the following steps:
s1-1, acquiring user data through network data of a substitution charging platform, performing type division according to charging types of the substitution charging platform, and extracting a behavior history log of substitution charging transaction;
s1-2, deleting noise fields contained in a behavior history log of a user substitution transaction, and reserving keyword fields, wherein the keyword fields comprise user ids, namely u_id, user client ips, namely client_ip, equipment ids used by users, namely device_id, recharging amount pay_current and recharging time pay_time;
s1-3, carrying out preliminary filtering screening on the substitute charging user data according to the keyword fields to form the substitute charging user data containing the keyword fields.
2. The iOS substitution risk control method based on the graph structure according to claim 1, wherein the S2 comprises:
s2-1, preliminarily filtering and screening user data to form a graph structure, wherein user nodes in the graph structure are formed by user u_id;
s2-2, selecting different recharging types of the recharging platform according to user data to form first type data, second type data, third type data and fourth type data, wherein the first type data to the fourth type data are sequentially increased;
s2-3, a user sends recharging requests to different recharging types of a substitution recharging platform, any one type of data from first type data to fourth type data is selected to establish a standard of a graphic structure, if the recharging requests are generated between a first user u_id1 and a second user u_id2 through a shared user client side_ip, and recharging amount pay_amountis greater than or equal to the selected type of data, a directed edge pointing to each other is generated between two user nodes of the first user u_id1 and the second user u_id2;
s2-4, if recharging operation occurs between the first user u_id1 and the second user u_id2 through a shared iOS device, and the recharging amount pay_amountis greater than or equal to the type of data, directional edges pointing to each other are generated between the two user nodes of the first user u_id1 and the second user u_id2; the Graph structure Graph of all recharging users can be constructed by acquiring the behavior history log of the user substitution recharging transaction.
3. The iOS substitution risk control method based on the graph structure according to claim 1, wherein the S3 comprises:
s3-1, calculating the pagerank value of each point in the Graph structure Graph through a pagerank algorithm, wherein when any user node performs the substitution operation, the pagerank calculates the possibility that the user node reaches a certain generation of charging platform after clicking any time of links, if the more external back-pointing links from other high-clicking-rate substitution charging platforms are possessed by a certain generation of charging platform, the larger the probability that the pointing rate of the user performing the substitution operation reaches the substitution charging platform is, otherwise, the smaller the probability that the pointing rate of the user performing the substitution charging operation reaches the substitution charging platform is;
s3-2, the pagerank algorithm endows each generation charging platform with an evaluation value for indicating the link importance degree of the generation charging platform, and an importance index formed by the high click rate generation charging platform is obtained according to the importance indexes of all other generation charging platforms pointing to the generation charging platform and the link numbers of the generation charging platforms contained in the generation charging platforms;
s3-3, calculating importance indexes, namely pagerank values, for the user u_id in each Graph structure Graph through a pagerank algorithm.
4. The iOS-based risk control method for replacing charging according to claim 1, wherein S4 comprises:
s4-1, network community discovery is carried out on the Graph structure Graph, semi-supervised learning is carried out through a label propagation algorithm, label information of marked user nodes is utilized to predict label information of unmarked nodes, in the Graph structure Graph, connection of some user nodes is tight, and connection relation among some users is sparse;
s4-2, in the network community of the generation and filling of all user data, the part with the compact connection of the Graph structure is regarded as one network community of the generation and filling, the internal user nodes of the network community are connected more tightly, the part with the sparse connection of the Graph structure is regarded as another network community of the generation and filling, the relative connection of the network communities of the generation and filling is sparse, and the nodes in the Graph structure can be divided into a plurality of network communities of the generation and filling through LPA.
5. The iOS-based risk control method for replacing charging according to claim 3, wherein S5 comprises:
s5-1, calculating an average pagerank of each generation charging network community, obtaining a plurality of generation charging network communities which are closely connected respectively through an LPA algorithm after obtaining the importance degree pagerank of each user u_id in a Graph, and obtaining the importance degree label_pagerank of each generation charging network community in the Graph structure Graph by calculating the average value of the pagerank of each user u_id in the generation charging network communities;
s5-2, analyzing the captured substitution charging user data, wherein the substitution charging network community importance index is in direct proportion to the occurrence substitution charging behavior probability of all user u_ids in the substitution charging network community, and the higher the substitution charging network community importance index is, the larger the substitution charging proportion of the user u_ids contained in the substitution charging network community is, and the importance degree label_pagerank of the substitution charging network community can be used as a basis for judging the substitution charging possibility of all the user u_ids in the network community.
6. The iOS-based risk control method for replacing charging based on graph structure according to claim 1, further comprising:
s6, setting a judgment threshold value alpha in a substitution charging platform acquired by the iOS, and judging that all the user u_ids in the substitution charging network community generate substitution charging behaviors when the importance degree label_pagerank of the substitution charging network community is larger than alpha and smaller than alpha, wherein the user u_id in the substitution charging network community is a normal user.
CN201910567553.8A 2019-06-27 2019-06-27 iOS charging risk control method based on graph structure Active CN110310122B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910567553.8A CN110310122B (en) 2019-06-27 2019-06-27 iOS charging risk control method based on graph structure

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910567553.8A CN110310122B (en) 2019-06-27 2019-06-27 iOS charging risk control method based on graph structure

Publications (2)

Publication Number Publication Date
CN110310122A CN110310122A (en) 2019-10-08
CN110310122B true CN110310122B (en) 2023-09-01

Family

ID=68076735

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910567553.8A Active CN110310122B (en) 2019-06-27 2019-06-27 iOS charging risk control method based on graph structure

Country Status (1)

Country Link
CN (1) CN110310122B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105279187A (en) * 2014-07-15 2016-01-27 天津科技大学 Edge clustering coefficient-based social network group division method
CN105893381A (en) * 2014-12-23 2016-08-24 天津科技大学 Semi-supervised label propagation based microblog user group division method
CN105915602A (en) * 2016-04-13 2016-08-31 华南理工大学 Community-detection-algorithm-based P2P network scheduling method and system
CN107194623A (en) * 2017-07-20 2017-09-22 深圳市分期乐网络科技有限公司 A kind of discovery method and device of clique's fraud
CN108009915A (en) * 2017-12-21 2018-05-08 连连银通电子支付有限公司 A kind of labeling method and relevant apparatus of fraudulent user community
CN108376371A (en) * 2018-02-02 2018-08-07 众安信息技术服务有限公司 A kind of internet insurance marketing method and system based on social networks
CN109598509A (en) * 2018-10-17 2019-04-09 阿里巴巴集团控股有限公司 The recognition methods of risk clique and device
CN109934698A (en) * 2019-01-29 2019-06-25 华融融通(北京)科技有限公司 A kind of fraud related network feature extracting method propagated based on label

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030158897A1 (en) * 2000-05-09 2003-08-21 Viryanet Ltd. Networked platform for creating and supporting communities
US7958120B2 (en) * 2005-05-10 2011-06-07 Netseer, Inc. Method and apparatus for distributed community finding
EP3482353A4 (en) * 2016-07-11 2019-07-24 Visa International Service Association Machine learning and prediction using graph communities
WO2018077039A1 (en) * 2016-10-27 2018-05-03 腾讯科技(深圳)有限公司 Community discovery method, apparatus, server, and computer storage medium
EP3477906B1 (en) * 2017-10-26 2021-03-31 Accenture Global Solutions Limited Systems and methods for identifying and mitigating outlier network activity

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105279187A (en) * 2014-07-15 2016-01-27 天津科技大学 Edge clustering coefficient-based social network group division method
CN105893381A (en) * 2014-12-23 2016-08-24 天津科技大学 Semi-supervised label propagation based microblog user group division method
CN105915602A (en) * 2016-04-13 2016-08-31 华南理工大学 Community-detection-algorithm-based P2P network scheduling method and system
CN107194623A (en) * 2017-07-20 2017-09-22 深圳市分期乐网络科技有限公司 A kind of discovery method and device of clique's fraud
CN108009915A (en) * 2017-12-21 2018-05-08 连连银通电子支付有限公司 A kind of labeling method and relevant apparatus of fraudulent user community
CN108376371A (en) * 2018-02-02 2018-08-07 众安信息技术服务有限公司 A kind of internet insurance marketing method and system based on social networks
CN109598509A (en) * 2018-10-17 2019-04-09 阿里巴巴集团控股有限公司 The recognition methods of risk clique and device
CN109934698A (en) * 2019-01-29 2019-06-25 华融融通(北京)科技有限公司 A kind of fraud related network feature extracting method propagated based on label

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
郑少强 ; 赵中英 ; 冯慧子 ; 李超 ; .一种面向社区发现的高鲁棒性标签传播算法.小型微型计算机系统.2018,(08),全文. *

Also Published As

Publication number Publication date
CN110310122A (en) 2019-10-08

Similar Documents

Publication Publication Date Title
CN110335123B (en) Commodity recommendation method, system, computer readable medium and device based on social e-commerce platform
CN112559301B (en) Service processing method, storage medium, processor and electronic device
Li et al. Method for evaluating the importance of power grid nodes based on PageRank algorithm
CN106251168A (en) Information-pushing method and system
WO2014193700A1 (en) Social media pricing engine
CN110225104A (en) Data capture method, device and terminal device
CN110555172A (en) user relationship mining method and device, electronic equipment and storage medium
JP2020521232A (en) A distributed node cluster for establishing digital touchpoints across multiple devices on a digital communication network
Sahinoglu et al. CLOUD computing
CN110443265A (en) A kind of behavioral value method and apparatus based on corporations
CN107798558A (en) User behavior data analysis method and server
CN204790977U (en) APP automatic compilation system and management platform based on cloud calculates
CN110310122B (en) iOS charging risk control method based on graph structure
Mashal Evaluation and assessment of smart grid reliability using fuzzy multi-criteria decision-making
US11294917B2 (en) Data attribution using frequent pattern analysis
US11916946B2 (en) Systems and methods for network traffic analysis
CN114155067B (en) User portrait establishing method and system
CN113297436B (en) User policy distribution method and device based on relational graph network and electronic equipment
CN113792039B (en) Data processing method and device, electronic equipment and storage medium
CN110298669B (en) iOS charging risk control system based on graphic structure
CN110020131A (en) A kind of method and apparatus arranging commodity
Zhu Research on multi‐source mobile commerce service recommendation model of data fusion based on tree network
CN110866192B (en) Popularization efficiency evaluation method, popularization mode determination method and device
Stefan et al. Data Analytics for Low Voltage Electrical Grids.
Wicaksono et al. Literature review: visible light communication system business model scheme for telecommunication business in Indonesia

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant