CN112347392A - Anti-fraud assessment method and device based on transfer learning and electronic equipment - Google Patents

Anti-fraud assessment method and device based on transfer learning and electronic equipment Download PDF

Info

Publication number
CN112347392A
CN112347392A CN202011132042.2A CN202011132042A CN112347392A CN 112347392 A CN112347392 A CN 112347392A CN 202011132042 A CN202011132042 A CN 202011132042A CN 112347392 A CN112347392 A CN 112347392A
Authority
CN
China
Prior art keywords
domain data
fraud
data
target domain
source domain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011132042.2A
Other languages
Chinese (zh)
Inventor
薛贤巨
孙涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Qiyue Information Technology Co Ltd
Original Assignee
Shanghai Qiyue Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Qiyue Information Technology Co Ltd filed Critical Shanghai Qiyue Information Technology Co Ltd
Priority to CN202011132042.2A priority Critical patent/CN112347392A/en
Publication of CN112347392A publication Critical patent/CN112347392A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/35Clustering; Classification

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses an anti-fraud assessment method and device based on transfer learning and electronic equipment, wherein the method comprises the following steps: respectively acquiring anti-fraud source domain data and target domain data; the source domain data is user data of a field with a number greater than a preset number of fraud markers, and the target domain data is user data of a field to be anti-fraud evaluated; performing transfer learning on the source domain data and the target domain data; establishing an anti-fraud model according to the migrated source domain data and the migrated target domain data; and evaluating the fraudulent user according to the anti-fraud model. According to the method and the device, the anti-fraud assessment of the target domain is realized through the transfer learning of the source domain and the target domain, complex data labeling and model training are not required to be carried out on data in each service scene, the workload of the anti-fraud assessment can be effectively reduced, and the wind control cost is reduced. In addition, in the invention, the source domain data and the target domain data do not obey the same distribution, and the method has the advantage of wide application.

Description

Anti-fraud assessment method and device based on transfer learning and electronic equipment
Technical Field
The invention relates to the technical field of computer information processing, in particular to an anti-fraud assessment method and device based on transfer learning, electronic equipment and a computer readable medium.
Background
Due to the rapid development of the internet and the popularization of intelligent terminals, people can transact a plurality of services such as online shopping and electronic banking without going out of home. But then also face some network fraud.
Network fraud can be classified according to the purpose of fraud: marketing cheating (e.g. wool pulling, false traffic, etc.), spending cheating (e.g. cash-out), financial cheating (e.g. cheating loan, fraudulent swiping of bank card, fraudulent swiping of quota, etc.), transaction cheating (e.g. swiping good comment, swiping bad comment, malicious occupation, money laundering, etc.), account cheating (e.g. fishing, false registration, etc.), etc. Surveys have shown that cyber fraud is increasingly complex and pervasive to different industries, with economic losses of up to $ 4450 billion worldwide each year, and has evolved into a black industrial chain with well-organized, specialized and defined divisions, with serious challenges for the development of the internet industry.
At present, in anti-fraud wind control, machine learning is mainly carried out on risk characteristics of a whole service flow through a machine learning algorithm, so that fraud behaviors are identified. When the anti-fraud service scene changes, there is a phenomenon that the model in the current service scene cannot adapt to the new scene. For different service scenes, to realize anti-fraud wind control, client data needs to be accumulated in each service scene to serve as a label for supervised learning, and then a data acquisition model of a new scene is retrained. This anti-fraud approach requires a great deal of time and effort to label the samples and train the models, and is time and labor intensive, as well as costly.
Disclosure of Invention
The invention aims to solve the technical problems of multiple anti-fraud assessment workloads and large cost investment caused by the fact that labels need to be marked again and models need to be trained in different service scenes in the prior art.
In order to solve the above technical problem, a first aspect of the present invention provides an anti-fraud assessment method based on transfer learning, where the method includes:
respectively acquiring anti-fraud source domain data and target domain data; the source domain data is user data of a field with a number greater than a preset number of fraud markers, and the target domain data is user data of a field to be anti-fraud evaluated;
performing transfer learning on the source domain data and the target domain data;
establishing an anti-fraud model according to the migrated source domain data and the migrated target domain data;
and evaluating the fraudulent user according to the anti-fraud model.
According to a preferred embodiment of the present invention, the establishing an anti-fraud model according to the migrated source domain data and target domain data includes:
establishing an anti-fraud model and strategy according to the migrated source domain data;
and testing the migration effect according to the migrated target domain data.
According to a preferred embodiment of the present invention, after performing migration learning of multiple migration manners on the source domain data and the target domain data, the method further includes:
determining the maximum mean difference distance between the source domain data and the target domain data after the transfer learning;
adjusting the plurality of migration modes such that the maximum mean difference distance is minimized.
According to a preferred embodiment of the present invention, the migration method includes: the migration component analyzes TCA and/or a deep adaptation network DAN.
According to a preferred embodiment of the present invention, the plurality of migration modes are adjusted by hyper-parameter tuning, kernel function tuning, or data logic tuning, so that the maximum mean difference distance is minimized.
According to a preferred embodiment of the invention, anti-fraud models and strategies are established by deep learning classifiers.
In order to solve the above technical problem, a second aspect of the present invention provides an anti-fraud assessment apparatus based on transfer learning, the apparatus including:
the acquisition module is used for respectively acquiring anti-fraud source domain data and target domain data; the source domain data is user data of a field with a number greater than a preset number of fraud markers, and the target domain data is user data of a field to be anti-fraud evaluated;
the migration module is used for performing migration learning on the source domain data and the target domain data;
the creation module is used for establishing an anti-fraud model according to the migrated source domain data and the migrated target domain data;
and the evaluation module is used for evaluating the fraudulent user according to the anti-fraud model.
According to a preferred embodiment of the present invention, the creating module includes:
the sub-creation module is used for establishing an anti-fraud model and a strategy according to the migrated source domain data;
and the test module is used for testing the migration effect according to the migrated target domain data.
According to a preferred embodiment of the invention, the device further comprises:
the determining module is used for determining the maximum mean difference distance between the source domain data and the target domain data after the transfer learning;
and the adjusting module is used for adjusting the plurality of migration modes to enable the maximum mean difference distance to be minimum.
According to a preferred embodiment of the present invention, the migration method includes: the migration component analyzes TCA and/or a deep adaptation network DAN.
According to a preferred embodiment of the present invention, the adjusting module adjusts the plurality of migration modes in a manner of hyper-parameter tuning, kernel function tuning, or data logic tuning, so that the maximum mean difference distance is minimum.
According to a preferred embodiment of the present invention, the sub-creation module builds anti-fraud models and strategies through deep learning classifiers.
To solve the above technical problem, a third aspect of the present invention provides an electronic device, comprising:
a processor; and
a memory storing computer executable instructions that, when executed, cause the processor to perform the method described above.
In order to solve the above technical problem, a fourth aspect of the present invention proposes a computer-readable storage medium, wherein the computer-readable storage medium stores one or more programs that, when executed by a processor, implement the above method.
The method comprises the steps of taking the data distribution to be stable, taking sample data with fraud marks larger than a preset number as a source domain, taking the sample data of a service scene to be subjected to anti-fraud evaluation as a target domain, mapping the source domain data and the target domain data into the same distribution space through the transfer learning of the source domain data and the target domain data, and then establishing an anti-fraud model to perform anti-fraud evaluation on the target domain and the source domain. According to the method and the device, the anti-fraud assessment of the target domain is realized through the transfer learning of the source domain and the target domain, complex data labeling and model training are not required to be carried out on data in each service scene, the workload of the anti-fraud assessment can be effectively reduced, and the wind control cost is reduced. In addition, in the invention, the source domain data and the target domain data do not obey the same distribution, and the method has the advantage of wide application. The invention can also migrate between different tasks without the need to model each subtask separately.
Drawings
In order to make the technical problems solved by the present invention, the technical means adopted and the technical effects obtained more clear, the following will describe in detail the embodiments of the present invention with reference to the accompanying drawings. It should be noted, however, that the drawings described below are only illustrations of exemplary embodiments of the invention, from which other embodiments can be derived by those skilled in the art without inventive step.
FIG. 1 is a flow chart of an anti-fraud assessment method based on transfer learning according to the present invention;
FIG. 2 is a flow chart illustrating steps of establishing an anti-fraud model according to the migrated source domain data and target domain data according to the present invention;
FIG. 3 is a schematic structural framework diagram of an anti-fraud assessment apparatus based on transfer learning according to the present invention;
FIG. 4 is a block diagram of an exemplary embodiment of an electronic device in accordance with the present invention;
FIG. 5 is a schematic diagram of one embodiment of a computer-readable medium of the present invention.
Detailed Description
Exemplary embodiments of the present invention will now be described more fully hereinafter with reference to the accompanying drawings, in which exemplary embodiments of the invention may be embodied in many specific forms, and should not be construed as limited to the embodiments set forth herein. Rather, these exemplary embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the invention to those skilled in the art.
The structures, properties, effects or other characteristics described in a certain embodiment may be combined in any suitable manner in one or more other embodiments, while still complying with the technical idea of the invention.
In describing particular embodiments, specific details of structures, properties, effects, or other features are set forth in order to provide a thorough understanding of the embodiments by one skilled in the art. However, it is not excluded that a person skilled in the art may implement the invention in a specific case without the above-described structures, performances, effects or other features.
The flow chart in the drawings is only an exemplary flow demonstration, and does not represent that all the contents, operations and steps in the flow chart are necessarily included in the scheme of the invention, nor does it represent that the execution is necessarily performed in the order shown in the drawings. For example, some operations/steps in the flowcharts may be divided, some operations/steps may be combined or partially combined, and the like, and the execution order shown in the flowcharts may be changed according to actual situations without departing from the gist of the present invention.
The block diagrams in the figures generally represent functional entities and do not necessarily correspond to physically separate entities. I.e. these functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor means and/or microcontroller means.
The same reference numerals denote the same or similar elements, components, or parts throughout the drawings, and thus, a repetitive description thereof may be omitted hereinafter. It will be further understood that, although the terms first, second, third, etc. may be used herein to describe various elements, components, or sections, these elements, components, or sections should not be limited by these terms. That is, these phrases are used only to distinguish one from another. For example, a first device may also be referred to as a second device without departing from the spirit of the present invention. Furthermore, the term "and/or", "and/or" is intended to include all combinations of any one or more of the listed items.
In the invention, the transfer learning refers to a learning process of applying a model learned in an old field to a new field by using data, tasks or similarity among models.
The domain is a subject of migration learning, and the domain mainly includes data and probability distribution (i.e., labeling of data) for generating the data. The Source Domain (Source Domain) is a Domain with knowledge and a large amount of data labels, and is an object to be migrated; the Target Domain is the object that we will eventually give knowledge and label. The transfer of knowledge from the source domain to the target domain completes the migration. In the invention, the service scene with fraud marks larger than the preset number can be selected as the source domain, and the service field needing anti-fraud evaluation is taken as the target domain.
Referring to fig. 1, fig. 1 is a flowchart of an anti-fraud assessment method based on transfer learning according to the present invention, as shown in fig. 1, the method includes:
s1, respectively acquiring anti-fraud source domain data and target domain data;
the source domain data is user data of a domain with fraud labels larger than a preset number, and the target domain data is user data of a domain to be subjected to anti-fraud evaluation. The preset data can be preset according to needs so as to ensure that the source domain data has enough marked samples. In the present invention, the user data includes user basic data and user operation data. The user basic data is used for identifying the user identity, such as identity card data, contact data and the like. The user operation data is used for identifying the service operation of the user. Specifically, the user operation data may include: basic operation data and business operation data, wherein the basic operation comprises registration, login and the like, and correspondingly, the basic operation data comprises registration data and login data. The service operation is related to a specific service, and includes all operations of the user in the whole service. Taking the internet banking service as an example, the service operation includes: transfer accounts, consumption, payment, borrowing, deposit, etc. Taking online shopping as an example, the business operation includes: ordering, paying, receiving, refunding, returning, etc.
Specifically, a service scene with a number of fraud flags greater than a preset number may be selected as a source domain, and a service domain requiring anti-fraud evaluation may be used as a target domain. In one example, if the online banking scene is a target domain, one of a mobile phone bank, a direct sales bank or a wechat bank which is similar to the online banking scene and has fraud annotations larger than a preset number can be selected as a source domain; any two of the service scenarios, or all three of the service scenarios, may also be used as the source domain. Because the three service scenes have similarity, the multiple similar service scenes are used as the source domain, so that sufficient anti-fraud labeling samples of the source domain data can be ensured, and the accuracy of anti-fraud identification is improved.
S2, performing transfer learning on the source domain data and the target domain data;
in this step, migration learning in multiple migration modes can be performed on the source domain data and the target domain data. The migration methods include but are not limited to: migration Component Analysis (TCA) and Deep Adaptation Network (DAN). The TCA is an edge distribution self-adaptive method, and when a source domain and a target domain are in different data distribution, the TCA maps data of the two domains to a high-dimensional regeneration core Hilbert space together. In this space, the distance of the source domain data and the target domain data is minimized while preserving their respective internal properties to the greatest extent. The goal of TCA is to reduce the distance of the edge probability distribution of the source domain and the target domain, thereby completing the transfer learning. The DAN populates a deep convolutional neural network to a field self-adaptive scene, performs adaptive migration by taking the deep network as a carrier, and is mainly applied to the classification and regression problems. Deep neural networks can learn migratable features that exhibit good generalization ability on new tasks when used for domain adaptation.
Further, in order to improve the accuracy of the migration learning, the migration mode may be optimized, and the migration function may be evaluated for the Maximum Mean Difference (MMD). Therefore, after this step, the following step may be further performed:
s21, determining the maximum mean difference distance between the source domain data and the target domain data after the transfer learning;
the maximum mean difference Distance (D)s,Dt) Obtained by the following formula:
Figure BDA0002735477110000071
wherein D issRepresenting source domain data, DtRepresenting target domain data, n1Representing the number of source domain samples, n2Representing the number of samples in the target domain, phi is the mapping function.
And S22, adjusting the plurality of migration modes to enable the maximum mean difference to be minimum.
In the invention, the plurality of migration modes can be adjusted in a super-parameter tuning, kernel function tuning or data logic adjusting mode to enable the maximum mean difference distance to be minimum.
And S3, establishing an anti-fraud model according to the migrated source domain data and the migrated target domain data.
Illustratively, as shown in fig. 2, the present step includes:
s31, establishing an anti-fraud model and strategy according to the migrated source domain data;
and establishing an anti-fraud model and strategy through a deep learning classifier.
And S32, testing the migration effect according to the migrated target domain data.
And S4, evaluating the fraudulent user according to the anti-fraud model.
It is applied in a fraudulent user identification scenario. Specifically, the shown anti-fraud model can be used for user risk identification, sample labeling and the like of a target domain.
Fig. 3 is a schematic diagram of an architecture of an anti-fraud assessment apparatus based on transfer learning according to the present invention, as shown in fig. 3, the apparatus includes:
an obtaining module 31, configured to obtain anti-fraud source domain data and target domain data respectively; the source domain data is user data of a field with a number greater than a preset number of fraud markers, and the target domain data is user data of a field to be anti-fraud evaluated;
a migration module 32, configured to perform migration learning on the source domain data and the target domain data;
the creating module 33 is configured to create an anti-fraud model according to the migrated source domain data and target domain data;
and the evaluation module 34 is used for evaluating the fraudulent user according to the anti-fraud model.
Wherein the creating module 33 comprises:
the sub creation module 331 is configured to establish an anti-fraud model and a policy according to the migrated source domain data; specifically, the sub-creation module 331 establishes an anti-fraud model and a strategy through a deep learning classifier.
The testing module 332 is configured to test a migration effect according to the migrated target domain data.
Further, the apparatus further comprises:
the determining module is used for determining the maximum mean difference distance between the source domain data and the target domain data after the transfer learning;
and the adjusting module is used for adjusting the plurality of migration modes to enable the maximum mean difference distance to be minimum. Specifically, the adjusting module adjusts the plurality of migration modes in a manner of hyper-parameter tuning, kernel function tuning, or data logic tuning so that the maximum mean difference distance is minimum.
Wherein, the migration mode comprises: the migration component analyzes TCA and/or a deep adaptation network DAN.
Those skilled in the art will appreciate that the modules in the above-described embodiments of the apparatus may be distributed as described in the apparatus, and may be correspondingly modified and distributed in one or more apparatuses other than the above-described embodiments. The modules of the above embodiments may be combined into one module, or further split into multiple sub-modules.
In the following, embodiments of the electronic device of the present invention are described, which may be regarded as an implementation in physical form for the above-described embodiments of the method and apparatus of the present invention. Details described in the embodiments of the electronic device of the invention should be considered supplementary to the embodiments of the method or apparatus described above; for details which are not disclosed in embodiments of the electronic device of the invention, reference may be made to the above-described embodiments of the method or the apparatus.
Fig. 4 is a block diagram of an exemplary embodiment of an electronic device according to the present invention. The electronic device shown in fig. 4 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present invention.
As shown in fig. 4, the electronic device 400 of the exemplary embodiment is represented in the form of a general-purpose data processing device. The components of electronic device 400 may include, but are not limited to: at least one processing unit 410, at least one memory unit 420, a bus 430 connecting different electronic device components (including the memory unit 420 and the processing unit 410), a display unit 440, and the like.
The storage unit 420 stores a computer-readable program, which may be a code of a source program or a read-only program. The program may be executed by the processing unit 410 such that the processing unit 410 performs the steps of various embodiments of the present invention. For example, the processing unit 410 may perform the steps as shown in fig. 1.
The storage unit 420 may include readable media in the form of volatile storage units, such as a random access memory unit (RAM)4201 and/or a cache memory unit 4202, and may further include a read only memory unit (ROM) 4203. The storage unit 420 may also include a program/utility 4204 having a set (at least one) of program modules 4205, such program modules 4205 including, but not limited to: operating the electronic device, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
Bus 430 may be any bus representing one or more of several types of bus structures, including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local bus using any of a variety of bus architectures.
The electronic device 400 may also communicate with one or more external devices 300 (e.g., keyboard, display, network device, bluetooth device, etc.), enable a user to interact with the electronic device 400 via the external devices 400, and/or enable the electronic device 400 to communicate with one or more other data processing devices (e.g., router, modem, etc.). Such communication may occur via input/output (I/O) interfaces 450, and may also occur via a network adapter 460 with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN) and/or a public network such as the Internet). The network adapter 460 may communicate with other modules of the electronic device 400 via the bus 430. It should be appreciated that although not shown in FIG. 4, other hardware and/or software modules may be used in the electronic device 400, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID electronics, tape drives, and data backup storage electronics, among others.
FIG. 5 is a schematic diagram of one computer-readable medium embodiment of the present invention. As shown in fig. 5, the computer program may be stored on one or more computer readable media. The computer readable medium may be a readable signal medium or a readable storage medium. The readable storage medium may be, for example, but not limited to, an electronic device, apparatus, or device that is electronic, magnetic, optical, electromagnetic, infrared, or semiconductor, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. The computer program, when executed by one or more data processing devices, enables the computer-readable medium to implement the above-described method of the invention, namely: respectively acquiring anti-fraud source domain data and target domain data; the source domain data is user data of a field with a number greater than a preset number of fraud markers, and the target domain data is user data of a field to be anti-fraud evaluated; performing transfer learning on the source domain data and the target domain data; establishing an anti-fraud model according to the migrated source domain data and the migrated target domain data; and evaluating the fraudulent user according to the anti-fraud model.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments of the present invention described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiment of the present invention can be embodied in the form of a software product, which can be stored in a computer-readable storage medium (which can be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to make a data processing device (which can be a personal computer, a server, or a network device, etc.) execute the above-mentioned method according to the present invention.
The computer readable storage medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable storage medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution electronic device, apparatus, or device. Program code embodied on a readable storage medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations of the present invention may be written in any combination of one or more programming languages, including object oriented programming languages such as Java, C + + or the like and conventional procedural programming languages, such as "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
In summary, the present invention can be implemented as a method, an apparatus, an electronic device, or a computer-readable medium executing a computer program. Some or all of the functions of the present invention may be implemented in practice using a general purpose data processing device such as a microprocessor or a Digital Signal Processor (DSP).
While the foregoing embodiments have described the objects, aspects and advantages of the present invention in further detail, it should be understood that the present invention is not inherently related to any particular computer, virtual machine or electronic device, and various general-purpose machines may be used to implement the present invention. The invention is not to be considered as limited to the specific embodiments thereof, but is to be understood as being modified in all respects, all changes and equivalents that come within the spirit and scope of the invention.

Claims (9)

1. An anti-fraud assessment method based on transfer learning, the method comprising:
respectively acquiring anti-fraud source domain data and target domain data; the source domain data is user data of a field with a number greater than a preset number of fraud markers, and the target domain data is user data of a field to be anti-fraud evaluated;
performing transfer learning on the source domain data and the target domain data;
establishing an anti-fraud model according to the migrated source domain data and the migrated target domain data;
and evaluating the fraudulent user according to the anti-fraud model.
2. The method of claim 1, wherein the establishing an anti-fraud model from the migrated source domain data and target domain data comprises:
establishing an anti-fraud model and strategy according to the migrated source domain data;
and testing the migration effect according to the migrated target domain data.
3. The method according to any one of claims 1-2, wherein after performing migration learning of multiple migration modes on the source domain data and the target domain data, the method further comprises:
determining the maximum mean difference distance between the source domain data and the target domain data after the transfer learning;
adjusting the plurality of migration modes such that the maximum mean difference distance is minimized.
4. The method according to any one of claims 1-3, wherein the migration mode comprises: the migration component analyzes TCA and/or a deep adaptation network DAN.
5. The method according to any one of claims 1-4, wherein the plurality of migration patterns are adjusted by hyper-parametric tuning, kernel-function tuning, or data-logic tuning to minimize the maximum mean difference distance.
6. The method of any one of claims 1-5, wherein the anti-fraud model and policy are established by a deep learning classifier.
7. An apparatus for migration learning based anti-fraud assessment, the apparatus comprising:
the acquisition module is used for respectively acquiring anti-fraud source domain data and target domain data; the source domain data is user data of a field with a number greater than a preset number of fraud markers, and the target domain data is user data of a field to be anti-fraud evaluated;
the migration module is used for performing migration learning on the source domain data and the target domain data;
the creation module is used for establishing an anti-fraud model according to the migrated source domain data and the migrated target domain data;
and the evaluation module is used for evaluating the fraudulent user according to the anti-fraud model.
8. An electronic device, comprising:
a processor; and
a memory storing computer-executable instructions that, when executed, cause the processor to perform the method of any of claims 1-6.
9. A computer readable storage medium, wherein the computer readable storage medium stores one or more programs which, when executed by a processor, implement the method of any of claims 1-6.
CN202011132042.2A 2020-10-21 2020-10-21 Anti-fraud assessment method and device based on transfer learning and electronic equipment Pending CN112347392A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011132042.2A CN112347392A (en) 2020-10-21 2020-10-21 Anti-fraud assessment method and device based on transfer learning and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011132042.2A CN112347392A (en) 2020-10-21 2020-10-21 Anti-fraud assessment method and device based on transfer learning and electronic equipment

Publications (1)

Publication Number Publication Date
CN112347392A true CN112347392A (en) 2021-02-09

Family

ID=74359512

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011132042.2A Pending CN112347392A (en) 2020-10-21 2020-10-21 Anti-fraud assessment method and device based on transfer learning and electronic equipment

Country Status (1)

Country Link
CN (1) CN112347392A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113343087A (en) * 2021-06-09 2021-09-03 南京星云数字技术有限公司 Method and system for acquiring marketing user

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108304316A (en) * 2017-12-25 2018-07-20 浙江工业大学 A kind of Software Defects Predict Methods based on collaboration migration
CN109242107A (en) * 2018-09-11 2019-01-18 北京芯盾时代科技有限公司 Anti- fraud model training method, system based on transfer learning and counter cheat method
CN110543860A (en) * 2019-09-05 2019-12-06 燕山大学 Mechanical fault diagnosis method and system based on TJM (machine learning model) transfer learning

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108304316A (en) * 2017-12-25 2018-07-20 浙江工业大学 A kind of Software Defects Predict Methods based on collaboration migration
CN109242107A (en) * 2018-09-11 2019-01-18 北京芯盾时代科技有限公司 Anti- fraud model training method, system based on transfer learning and counter cheat method
CN110543860A (en) * 2019-09-05 2019-12-06 燕山大学 Mechanical fault diagnosis method and system based on TJM (machine learning model) transfer learning

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
梅子行: "《智能风控:原理、算法与工程实践》", 机械工业出版社, pages: 88 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113343087A (en) * 2021-06-09 2021-09-03 南京星云数字技术有限公司 Method and system for acquiring marketing user

Similar Documents

Publication Publication Date Title
US11151573B2 (en) Intelligent chargeback processing platform
CA3089076C (en) Method and system for user data driven financial transaction description dictionary construction
US11531987B2 (en) User profiling based on transaction data associated with a user
US20210216859A1 (en) Interpretability-Aware Adversarial Attack and Defense Method for Deep Learnings
US10726501B1 (en) Method to use transaction, account, and company similarity clusters derived from the historic transaction data to match new transactions to accounts
US20150262184A1 (en) Two stage risk model building and evaluation
US20220005041A1 (en) Enhancing explainability of risk scores by generating human-interpretable reason codes
CN108830443A (en) A kind of contract review method and device
CN111583018A (en) Credit granting strategy management method and device based on user financial performance analysis and electronic equipment
CN111626381A (en) User identification method and device based on anti-migration and electronic equipment
CN112347393A (en) Fraud prediction method and device based on heterogeneous ensemble learning and electronic equipment
CN113010798A (en) Information recommendation method, information recommendation device, electronic equipment and readable storage medium
CN112347392A (en) Anti-fraud assessment method and device based on transfer learning and electronic equipment
US11854018B2 (en) Labeling optimization through image clustering
CN112950347A (en) Resource data processing optimization method and device, storage medium and terminal
KR20210097204A (en) Methods and devices for outputting information
CN117009873A (en) Method for generating payment risk identification model, and method and device for payment risk identification
US20230111445A1 (en) Neural network based methods and systems for increasing approval rates of payment transactions
CN114742645B (en) User security level identification method and device based on multi-stage time sequence multitask
CN115587830A (en) Work task excitation method and device, computer equipment and storage medium
US11561963B1 (en) Method and system for using time-location transaction signatures to enrich user profiles
CN113568739A (en) User resource limit distribution method and device and electronic equipment
CN111178535A (en) Method and device for realizing automatic machine learning
US20220207409A1 (en) Timeline reshaping and rescoring
Shah et al. Data Balancing for Credit Card Fraud Detection Using Complementary Neural Networks and SMOTE Algorithm

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Country or region after: China

Address after: Room 1109, No. 4, Lane 800, Tongpu Road, Putuo District, Shanghai, 200062

Applicant after: Shanghai Qiyue Information Technology Co.,Ltd.

Address before: Room a2-8914, 58 Fumin Branch Road, Hengsha Township, Chongming District, Shanghai, 201500

Applicant before: Shanghai Qiyue Information Technology Co.,Ltd.

Country or region before: China

CB02 Change of applicant information