CN112381546A - Method for detecting abnormal risk account based on time series clustering - Google Patents

Method for detecting abnormal risk account based on time series clustering Download PDF

Info

Publication number
CN112381546A
CN112381546A CN202011389228.6A CN202011389228A CN112381546A CN 112381546 A CN112381546 A CN 112381546A CN 202011389228 A CN202011389228 A CN 202011389228A CN 112381546 A CN112381546 A CN 112381546A
Authority
CN
China
Prior art keywords
transaction
sequence
data
time
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011389228.6A
Other languages
Chinese (zh)
Inventor
施炎
徐德华
徐华建
余杰潮
汤敏伟
李�真
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Bestpay Co Ltd
Original Assignee
China Telecom Bestpay Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Bestpay Co Ltd filed Critical China Telecom Bestpay Co Ltd
Priority to CN202011389228.6A priority Critical patent/CN112381546A/en
Publication of CN112381546A publication Critical patent/CN112381546A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/23Clustering techniques

Landscapes

  • Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • General Physics & Mathematics (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Evolutionary Computation (AREA)
  • Evolutionary Biology (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Computer Security & Cryptography (AREA)
  • Artificial Intelligence (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

本发明公开了一种基于时间序列聚类检测异常风险账户的方法,从电商交易风险评估的现状及存在的问题出发,通过对国内外电商平台交易风险评估模式的方法进行了研究分析,以风险管理的方法论为指导,结合风险交易业务特征分析,提出了基于时间序列聚类检测异常风险账户的方法。本发明设计了一种基于时间序列聚类检测异常风险账户的方法。与传统的风控规则和直接聚类相比;使用时间序列的数据扩展了聚类数据的范围,能在时间维度上将相似或者相近的行为聚集在一起,从而有效的检测刷单、非法套利、黄牛抢购等行为的风险账户。

Figure 202011389228

The invention discloses a method for detecting abnormal risk accounts based on time series clustering. Starting from the current situation and existing problems of e-commerce transaction risk assessment, the method of transaction risk assessment mode of domestic and foreign e-commerce platforms is studied and analyzed, and the results are Guided by the methodology of risk management, combined with the analysis of risk transaction business characteristics, a method for detecting abnormal risk accounts based on time series clustering is proposed. The present invention designs a method for detecting abnormal risk accounts based on time series clustering. Compared with traditional risk control rules and direct clustering; the use of time-series data expands the scope of clustering data, and can cluster similar or similar behaviors together in the time dimension, thereby effectively detecting fraudulent orders and illegal arbitrage , the risk account of scalpers and other behaviors.

Figure 202011389228

Description

Method for detecting abnormal risk account based on time series clustering
Technical Field
The invention relates to the technical field of emerging information, in particular to a method for detecting an abnormal risk account based on time series clustering.
Background
In recent years, electronic commerce develops rapidly, and online ordering and shopping become the most important consumption form of people. After prosperous business, a large amount of transaction risk problems such as bill brushing, illegal arbitrage, yellow cattle rushing and the like on some electronic commerce platforms are developed intensively, the backward transaction risk management means becomes a bottleneck which hinders the healthy development of the platforms, great loss is brought to the e-commerce platforms, the rights and interests of common customers are also influenced, and the fairness, the justice and the authenticity of the e-commerce platforms are questioned by the public. The e-commerce is weak in experience in transaction risk management, the risk management is relatively late to start, and the e-commerce is subjected to transaction risk evaluation mainly by the experience of business personnel. With the increase of business volume and the increase of business complexity, especially the specialized development of black industrial chains such as cattle companies and water force companies, the traditional transaction risk management mode cannot meet the development requirement of risk management. Therefore, a set of scientific and intelligent transaction risk assessment system is constructed to detect abnormal risks and black product accounts, and the system has great significance for the healthy development of the e-commerce platform.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides a method for detecting abnormal risk accounts based on time series clustering.
In order to solve the technical problems, the invention provides the following technical scheme:
the invention discloses a method for detecting abnormal risk accounts based on time series clustering, which comprises the following steps:
step 1, data acquisition: acquiring user transaction data, user operation data and user basic attribute data of an area to be researched, wherein the user transaction data and the operation data comprise detailed names and time of each operation and transaction, and the user basic attribute data comprise a unique user identifier, a blacklist or blacklist, geographical position related information and the like;
step 2, data preprocessing: grouping the data acquired in the step 1 according to users, and sequencing the data in each user group according to the time sequence of operation and transaction occurrence;
step 3, generating a time sequence, namely arranging the operation names and the transaction names of the users according to the time sequence to form a first operation-transaction name sequence according to the data processed in the step 2; arranging each user operation name and transaction time point according to a time sequence to form a second operation-transaction time point sequence; subtracting the previous time point from the next time point according to the time sequence to form a third operation-transaction time interval sequence;
step 4, time series numeralization, namely, for a first operation-transaction name sequence, modeling the name sequence by using a seq2seq method, then vectorizing each name of the sequence by using the model, and finally adding results of all the vectorized names in the sequence to calculate an average value; for the second operation-transaction time point sequence, the calculation result of subtracting a fixed time node (such as 2020, 01/01) from each time point of the sequence is stored as day, hour, minute or second as required; for the third operation-transaction time interval sequence, directly converting into days, hours, minutes or seconds according to requirements;
step 5, clustering and grouping time series: taking the vector of the first operation-transaction name sequence in the step 4 as an input value, clustering and grouping by using a MeanShift clustering algorithm, grouping users with similar operations and transactions in time into the same group, and numbering each group;
and 6, calculating indexes in the time sequence group: and calculating the service indexes such as black sample ratio, average operation transaction time, average sequence length and the like of the users in each group, and determining the users exceeding the service indexes as abnormal risk accounts.
Compared with the prior art, the invention has the following beneficial effects:
the invention designs a method for detecting an abnormal risk account based on time series clustering. Compared with the traditional wind control rule and direct clustering; the data of the time series is used for expanding the range of the clustering data, and similar or similar behaviors can be gathered together in the time dimension, so that the risk accounts of behaviors such as bill swiping, illegal arbitrage, cattle first-aid purchase and the like can be effectively detected.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
FIG. 1 is a general schematic of the system of the present invention;
FIG. 2 is a diagram of the seq2seq model of the present invention;
FIG. 3 is a diagram of a MeanShift clustering model of the present invention;
FIG. 4 is a computed composite index map of the present invention;
FIG. 5 is one of the schematic diagrams of an embodiment of the present invention;
FIG. 6 is a schematic diagram of another embodiment of the present invention;
fig. 7 is a third schematic diagram of the embodiment of the present invention.
Detailed Description
The preferred embodiments of the present invention will be described in conjunction with the accompanying drawings, and it will be understood that they are described herein for the purpose of illustration and explanation and not limitation.
Example 1
According to the method for detecting the abnormal risk account based on the time series clustering, provided by the embodiment of the invention, clustering grouping is carried out by utilizing the similarity of the time series according to the operation data and the transaction data of a user, and then various risk indexes in the group are calculated, so that the abnormal risk account is found out. The specific implementation steps are shown in fig. 1.
The following is a detailed description:
first, the comprehensive data of a user in a period of time, including transaction data, operation data and basic attribute data, are acquired. Taking winged payment as an example, the fields of the transaction data comprise user id, transaction name, transaction type, whether marketing preference is given or not and transaction time; the field of the operation data comprises a user id, an operation name, an operation type and operation time; the fields of the basic attributes of the user include the user id, the home identity and whether to be blacklisted. After the data are received, the three types of data are connected by using the user id, and the connected data are subjected to the work of removing the duplicate, cleaning and the like. After the three kinds of data are connected, the data are sequenced according to the sequence of the user, the transaction and the operation.
Next, the sorted data is preprocessed. For trade and operation names, the longitude of the later modeling is influenced because the trade and operation names have a large number of names with low occupation ratio in the data set, the number and occupation ratio of each name in the whole data set are counted first, and the names with small number and low occupation ratio are deleted. For time nodes where transactions and operations occur, since time node data is not numerical data,
no relevant numerical calculations can be performed, so time node data is converted into numerical data in two different ways. The first is to form a time node sequence by subtracting a fixed time node from a current time node, and the second is to form a time interval sequence by subtracting a previous time node from a later time node.
After the data preprocessing is completed, the transaction operation name sequence is encoded numerically, and here, the seq2seq algorithm shown in fig. 2 is used to encode the transaction operation name sequence numerically. The Sequence-to-Sequence is a generic Encoder-Decoder framework, and is known as Sequence-to-Sequence in the name of Sequence 2 Seq. The method is also a very important and popular sequence model in the current natural language processing technology, breaks through the traditional fixed-size input problem framework, opens the way to apply the classical deep neural network model to the sequence tasks of translation and intelligent question answering, and is proved to have very good performance in the mutual translation among main languages and the application of man-machine short-question answering in a voice assistant. The so-called Seq2Seq task mainly refers to the mapping problem from Sequence to Sequence, where Sequence is understood herein as a string Sequence (as in the name of trade operation in this patent), and when we want to obtain another string Sequence (as translated, e.g. semantically corresponding) after a string Sequence is given, this task can be called Seq2 Seq. The Seq2Seq is a neural network of an Encoder-Decoder structure, as shown in fig. 5, whose input is a Sequence (Sequence) and output is also a Sequence (Sequence), and hence the name "Seq 2 Seq". In the Encoder, a variable-length sequence is converted into a fixed-length vector expression, and the Decode converts the fixed-length vector into a variable-length signal sequence of a target; the most basic Seq2Seq model comprises three parts (some parts are not shown in fig. 5), namely an Encoder, a Decoder and an intermediate state vector C connecting the Encoder and the Decoder, wherein the Encoder encodes a state vector C (also called semantic encoding) with a fixed size through learning input, then the Encoder transmits the C to the Decoder, and the Decoder outputs a corresponding sequence through learning the state vector C.
BasicSeq2Seq has many drawbacks, and the process of first Encoder encoding the input into a fixed-size state vector (hiddenstate) is actually a "lossy compression of information" process. If the amount of information is larger, the process of converting the vector causes larger loss of information. Meanwhile, as the sequence length is increased, meaning that the sequence in the time dimension is long, the RNN model also has gradient diffusion. Finally, the component of the underlying model that connects the Encoder and Decode modules is simply a fixed-size state vector, which makes it impossible for the Decode to directly focus on more details of the input information. Due to the various deficiencies of the BasicSeq2Seq, the patent uses the Seq2Seq model based on Attention. The principle of the Attention mechanism: to solve the problem of BasicSeq2Seq, an Attention model was then introduced. The Attention model is characterized in that the Decoder does not encode the whole input sequence into a middle semantic vector with fixed length, but calculates new words according to the currently generated new words, so that the input at each moment is different, and the problem of word information loss is solved. An Encoder-Decoder model introduced with Attention is shown in FIG. 6;
the simple Encoder-Decoder framework does not effectively focus on the input target, which makes the model like seq2seq not exert the maximum efficacy when used alone. For example, in fig. 6, the encoder encodes the input into a context variable C, and each output Y is decoded using this C indiscriminately. What the attention model does is to encode the encoder into different C according to each time step of the sequence, and when decoding, the encoder outputs the encoded C by combining with each different C, so that the obtained result is more accurate. The input sequence and the output sequence in the patent are the same and are name sequences of operation transactions, the model is converged through continuous iteration and training, and the Encoder part of the model is stored after the model is converged. When the model is used, the name sequence of the operation transaction is input to the Encoder part, a numerical value vector is output, and the numerical value vector is used for representing the name sequence of the operation transaction, so that the numerical coding of the transaction operation name sequence is realized.
After the numerical coding is carried out on the transaction operation name sequence, the numerical vectors subjected to the numerical coding need to be clustered, and the MeanShift clustering algorithm shown in the figure 3 is mainly used in the patent. The Meanshift algorithm is a hill climbing algorithm based on kernel density estimation, and can be used in application scenes such as clustering, image segmentation and tracking. The key operation of the MeanShift algorithm is to calculate the shift vector of the center point through the data density change in the region of interest, so as to move the center point for the next iteration until reaching the position of maximum density (the center point is unchanged). This can be done starting from each data point, during which the number of times data appear in the region of interest is counted. This parameter will be the basis for classification at the end. Unlike the K-Means algorithm, the Means Shift algorithm can automatically determine the number of classes. As with the K-Means algorithm, both use the mean of the data points in the set to move the center point.
As shown in fig. 7, the steps related to the MeanShift clustering algorithm are as follows:
1. randomly selecting one point from the unmarked data points as a starting center point center;
2. finding out all data points appearing in an area with the center as the center radius as radius, considering that the points belong to a cluster C, and adding 1 to the frequency of appearance of the recorded data points in the cluster;
3. taking the center as a central point, calculating vectors from the center to each element in the set M, and adding the vectors to obtain a vector shift;
center + shift, that is, the center moves along the shift direction by an | shift |;
5. repeating the steps 2, 3 and 4 until shift is very small (namely iteration is converged), remembering the center at this time, and noting that all the points encountered in the iteration process should be classified into a cluster C;
6. if the distance between the center of the current cluster C and the centers of other existing clusters C2 is smaller than the threshold value during convergence, merging C2 and C, and correspondingly merging the occurrence times of data points, otherwise, taking C as a new cluster;
7. repeat 1, 2, 3, 4, 5 until all points are marked as visited;
8. and (4) classification: and according to each class, for the access frequency of each point, taking the class with the maximum access frequency as the class to which the current point set belongs.
The method and the device use the MeanShift algorithm to cluster and group the vector of the numerical coding of the transaction operation name sequence, thereby effectively grouping the transaction operation name sequences in the same group in a similar or similar way.
The last important step of the method is to calculate the business index related to the risk in each group. The main services include: the method comprises the following steps of group black user proportion, group marketing user proportion, group user attribution province proportion, group user sequence average length proportion, group average time interval for transaction operation and other indexes, and then according to the business rules, the calculated group with the index exceeding the threshold value is an abnormal group. The accounts within the exception group are exception risk accounts.
Compared with the prior art, the invention has the following beneficial effects:
the invention designs a method for detecting an abnormal risk account based on time series clustering. Compared with the traditional wind control rule and direct clustering; the data of the time series is used for expanding the range of the clustering data, and similar or similar behaviors can be gathered together in the time dimension, so that the risk accounts of behaviors such as bill swiping, illegal arbitrage, cattle first-aid purchase and the like can be effectively detected.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that changes may be made in the embodiments and/or equivalents thereof without departing from the spirit and scope of the invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (1)

1.一种基于时间序列聚类检测异常风险账户的方法,其特征在于,包括以下步骤:1. a method for detecting abnormal risk accounts based on time series clustering, is characterized in that, comprises the following steps: 步骤1,数据获取:获取待研究区域的用户交易数据,用户操作数据,用户基本属性数据,其中用户交易数据和操作数据包含每个操作和交易的详细名称和时间,用户基本属性数据包含用户唯一标识,是否中黑名单,地理位置相关信息等;Step 1, data acquisition: obtain the user transaction data, user operation data, and user basic attribute data in the area to be studied, wherein the user transaction data and operation data include the detailed name and time of each operation and transaction, and the user basic attribute data includes the user's unique attribute data. Identification, whether it is in the blacklist, geographic location-related information, etc.; 步骤2,数据预处理:将步骤1所获取的数据,按照用户先进行分组,在每个用户的组内按照操作和交易发生的时间顺序进行排序;Step 2, data preprocessing: group the data obtained in step 1 according to the user first, and sort each user's group according to the chronological order of operations and transactions; 步骤3,生成时间序列:将步骤2处理好的数据,将每个用户的操作名称和交易名称按照时间顺序排列形成第一操作-交易名称序列;将每个用户操作名称和交易时间点按照时间顺序排列形成第二操作-交易时间点序列;将每个用户操作名称和交易时间点按照时间顺序后一个时间点减去前一个时间点形成第三操作-交易时间间隔序列;Step 3, generate time series: the data processed in step 2, the operation name and transaction name of each user are arranged in chronological order to form the first operation-transaction name sequence; the operation name and transaction time point of each user are arranged according to time. Arrange in order to form the second operation-transaction time point sequence; subtract each user operation name and transaction time point from the previous time point in the chronological order to form the third operation-transaction time interval sequence; 步骤4,时间序列数值化:对于第一操作-交易名称序列,首先使用seq2seq方法对名称序列建模,然后利用该模型对该序列的每个名称进行向量化,最后将该序列中所有名称向量化后的结果相加求平均值;对于第二操作-交易时间点序列,将该序列的每个时间点减去一个固定的时间节点(如2020年01月01日)计算结果根据需要保存为天,时,分或者秒;对于第三操作-交易时间间隔序列,根据需求直接换算成天,时,分或者秒;Step 4, time series numericalization: for the first operation - transaction name sequence, first use the seq2seq method to model the name sequence, then use the model to vectorize each name of the sequence, and finally vectorize all the names in the sequence The transformed results are added and averaged; for the second operation-transaction time point sequence, each time point in the sequence is subtracted by a fixed time node (such as January 1, 2020), and the calculation result is saved as required. days, hours, minutes or seconds; for the third operation-transaction time interval sequence, it can be directly converted into days, hours, minutes or seconds as required; 步骤5,时间序列聚类分组:以步骤4第一操作-交易名称序列的向量做为输入值,使用MeanShift聚类算法进行聚类分组,将在时间上具有相似操作和交易的用户分到相同的组中并给每个组编号;Step 5, time series clustering and grouping: using the vector of the first operation-transaction name sequence in step 4 as the input value, use the MeanShift clustering algorithm for clustering and grouping, and assign users with similar operations and transactions in time to the same group. groups and number each group; 步骤6,时间序列组内指标计算:计算每个组内用户的黑样本占比,平均操作交易时间,平均序列长度等业务指标,把超过业务指标的认定为异常风险账户。Step 6: Calculation of intra-group indicators in time series: Calculate the proportion of black samples of users in each group, average operation transaction time, average sequence length and other business indicators, and identify those exceeding business indicators as abnormal risk accounts.
CN202011389228.6A 2020-12-01 2020-12-01 Method for detecting abnormal risk account based on time series clustering Pending CN112381546A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011389228.6A CN112381546A (en) 2020-12-01 2020-12-01 Method for detecting abnormal risk account based on time series clustering

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011389228.6A CN112381546A (en) 2020-12-01 2020-12-01 Method for detecting abnormal risk account based on time series clustering

Publications (1)

Publication Number Publication Date
CN112381546A true CN112381546A (en) 2021-02-19

Family

ID=74589852

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011389228.6A Pending CN112381546A (en) 2020-12-01 2020-12-01 Method for detecting abnormal risk account based on time series clustering

Country Status (1)

Country Link
CN (1) CN112381546A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114021661A (en) * 2021-11-10 2022-02-08 上海冰鉴信息科技有限公司 An account classification method, device and electronic device
CN116204843A (en) * 2023-04-24 2023-06-02 北京芯盾时代科技有限公司 Abnormal account detection method and device, electronic equipment and storage medium
CN117010905A (en) * 2023-10-08 2023-11-07 中国建设银行股份有限公司 Dynamic identification processing method and device for transaction risk list data
CN117455497A (en) * 2023-11-12 2024-01-26 北京营加品牌管理有限公司 Transaction risk detection method and device
CN119130539A (en) * 2024-09-06 2024-12-13 南京五九盾科技有限公司 E-commerce platform high-risk user identification method based on time sequence data analysis

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114021661A (en) * 2021-11-10 2022-02-08 上海冰鉴信息科技有限公司 An account classification method, device and electronic device
CN116204843A (en) * 2023-04-24 2023-06-02 北京芯盾时代科技有限公司 Abnormal account detection method and device, electronic equipment and storage medium
CN117010905A (en) * 2023-10-08 2023-11-07 中国建设银行股份有限公司 Dynamic identification processing method and device for transaction risk list data
CN117010905B (en) * 2023-10-08 2023-12-29 中国建设银行股份有限公司 Dynamic identification processing method and device for transaction risk list data
CN117455497A (en) * 2023-11-12 2024-01-26 北京营加品牌管理有限公司 Transaction risk detection method and device
CN119130539A (en) * 2024-09-06 2024-12-13 南京五九盾科技有限公司 E-commerce platform high-risk user identification method based on time sequence data analysis

Similar Documents

Publication Publication Date Title
CN112381546A (en) Method for detecting abnormal risk account based on time series clustering
CN113902534B (en) A method for identifying interactive risk groups based on stock community relationship graph
CN109544190A (en) A kind of fraud identification model training method, fraud recognition methods and device
Shmueli et al. Neural network analysis of travel behavior: evaluating tools for prediction
CN111159387A (en) Recommendation method based on multi-dimensional alarm information text similarity analysis
CN115269357A (en) A Microservice Anomaly Detection Method Based on Call Chain
CN113032525A (en) False news detection method and device, electronic equipment and storage medium
CN112328859A (en) A fake news detection method based on knowledge-aware attention network
CN110704694A (en) Organization hierarchy dividing method based on network representation learning and application thereof
CN116245110A (en) Multi-dimensional information fusion user standing detection method based on graph attention network
CN114298712A (en) Encryption currency abnormal transaction detection method and application
CN115049472B (en) An unsupervised credit card anomaly detection method based on multi-dimensional feature tensors
CN116934270A (en) Library book borrowing management system based on data analysis
Bakirli et al. DTreeSim: A new approach to compute decision tree similarity using re-mining
CN118247006A (en) Product information pushing processing method and device
CN112966728A (en) Transaction monitoring method and device
O’Dea et al. Combining feature selection and neural networks for solving classification problems
CN116805022A (en) A specific Twitter user mining method based on group communication
CN108345851A (en) A method of based on recognition of face analyzing personal hobby
WO2024001102A1 (en) Method and apparatus for intelligently identifying family circle in communication industry, and device
CN115018007A (en) Sensitive data classification method based on improved ID3 decision tree
CN117014382B (en) Data stream processing system and method based on convergence and distribution equipment
CN116842141B (en) Alarm smoke linkage based digital information studying and judging method
CN113034262A (en) Personal credit evaluation dynamic integration algorithm based on big data technology
CN116109318B (en) Interactive financial payment and big data compression storage method and system based on blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20210219

WD01 Invention patent application deemed withdrawn after publication