CN117113402A - Data mining method, device, equipment and readable storage medium - Google Patents

Data mining method, device, equipment and readable storage medium Download PDF

Info

Publication number
CN117113402A
CN117113402A CN202311074599.9A CN202311074599A CN117113402A CN 117113402 A CN117113402 A CN 117113402A CN 202311074599 A CN202311074599 A CN 202311074599A CN 117113402 A CN117113402 A CN 117113402A
Authority
CN
China
Prior art keywords
data
privacy
distortion
target
data mining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311074599.9A
Other languages
Chinese (zh)
Inventor
王家礼
任帅
葛洋洋
张漫漫
陶芳娜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202311074599.9A priority Critical patent/CN117113402A/en
Publication of CN117113402A publication Critical patent/CN117113402A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The application discloses a data mining method, a device, equipment and a readable storage medium, which can be applied to the field of big data or the field of finance, wherein the data mining method comprises the following steps: receiving a data mining request, wherein the data mining request comprises identification information of target privacy distortion data; determining target privacy distortion data from a privacy distortion database according to the identification information, wherein the privacy distortion database comprises a plurality of privacy distortion data, and the privacy distortion data is obtained by performing distortion processing on the privacy data by a client; and inputting the target privacy distortion data into a target data mining model to obtain an analysis result of the target privacy distortion data. Therefore, when the data is mined, the application does not need to acquire complete privacy data from the client, but only performs data mining according to the privacy distortion data, so that even if the data is leaked, the data processing platform also distorts the data instead of the complete privacy data, thereby improving the security of the privacy data.

Description

Data mining method, device, equipment and readable storage medium
Technical Field
The present application relates to the field of big data, and more particularly, to a data mining method, apparatus, device, and readable storage medium.
Background
With the popularization of the internet and the application of large data technology, large enterprises and service organizations have acquired a large amount of data, such as patient diagnosis data sets established by medical institutions, customer online transaction data sets collected by e-commerce enterprises, customer information and transaction data stored by financial companies, and the like. Enterprises or institutions analyze the data sets, can obtain more valuable knowledge, then provide better services for clients, and improve living standards. However, such data sets store a large amount of data related to personal privacy, such as identity information, address information, communication information, etc., and privacy revealing events are very likely to occur.
The existing method for improving the security of the private data is generally that a data processing platform which is expected to collect the private data for data mining can comply with laws and regulations, and does not actively reveal the private data. However, once the data processing platform leaks the private data, a serious threat is posed to the security of the private data.
Disclosure of Invention
The embodiment of the application provides a data mining method, a device, equipment and a readable storage medium, which can improve the security of private data.
In view of this, an embodiment of the present application provides a data mining method, including:
receiving a data mining request, wherein the data mining request comprises identification information of target privacy distortion data;
determining target privacy distortion data from a privacy distortion database according to the identification information, wherein the privacy distortion database comprises a plurality of privacy distortion data, and the privacy distortion data is obtained by performing distortion processing on the privacy data by a client;
and inputting the target privacy distortion data into a target data mining model to obtain an analysis result of the target privacy distortion data.
Optionally, the method further comprises:
receiving initial privacy distortion data sent by a client;
normalizing the initial privacy data to obtain privacy distortion data;
the privacy distortion data is stored in a privacy distortion database.
Optionally, the method further comprises:
determining an original data mining model;
acquiring privacy distortion data to be trained and an analysis result of the privacy distortion data to be trained;
and training the original data mining model according to the privacy distortion data to be trained and the analysis result of the privacy distortion data to be trained to obtain the target data mining model.
Optionally, the method further comprises:
acquiring privacy distortion data to be tested and an analysis result of the privacy distortion data to be tested;
inputting the privacy distortion data to be tested into the target data mining model to obtain an analysis result to be verified;
determining the accuracy of the target data mining model according to the analysis result to be verified and the analysis result of the privacy distortion data to be tested;
and if the accuracy is lower than a preset threshold, re-executing the step of determining the original data mining model.
The embodiment of the application also provides a data mining device, which comprises:
a receiving unit configured to receive a data mining request, where the data mining request includes identification information of target privacy distortion data;
the first determining unit is used for determining target privacy distortion data from a privacy distortion database according to the identification information, wherein the privacy distortion database comprises a plurality of privacy distortion data, and the privacy distortion data is obtained by performing distortion processing on the privacy data by a client;
and the input unit is used for inputting the target privacy distortion data into a target data mining model to obtain an analysis result of the target privacy distortion data.
Optionally, the apparatus further comprises:
the receiving unit is used for receiving the initial privacy distortion data sent by the client;
the processing unit is used for carrying out normalization processing on the initial privacy data to obtain privacy distortion data;
and the storage unit is used for storing the privacy distortion data in a privacy distortion database.
Optionally, the apparatus further comprises:
the second determining unit is used for determining an original data mining model;
the acquisition unit is used for acquiring the privacy distortion data to be trained and the analysis result of the privacy distortion data to be trained;
the training unit is used for training the original data mining model according to the privacy distortion data to be trained and the analysis result of the privacy distortion data to be trained to obtain the target data mining model.
The embodiment of the application also provides computer equipment, which comprises: a memory, a processor, and a bus system;
wherein the memory is used for storing programs;
the processor is used for executing the program in the memory so as to realize any one of the data mining methods;
the bus system is used for connecting the memory and the processor so as to enable the memory and the processor to communicate.
The embodiments of the present application also provide a computer readable storage medium storing instructions that, when executed on a computer, cause the computer to perform any of the data mining methods described above.
The embodiment of the application provides a data mining method, which comprises the following steps: receiving a data mining request, wherein the data mining request comprises identification information of target privacy distortion data; determining target privacy distortion data from a privacy distortion database according to the identification information, wherein the privacy distortion database comprises a plurality of privacy distortion data, and the privacy distortion data is obtained by performing distortion processing on the privacy data by a client; and inputting the target privacy distortion data into a target data mining model to obtain an analysis result of the target privacy distortion data. Therefore, when the data is mined, the application does not need to acquire complete privacy data from the client, but only performs data mining according to the privacy distortion data, so that even if the data is leaked, the data processing platform also distorts the data instead of the complete privacy data, thereby improving the security of the privacy data.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are required to be used in the embodiments or the description of the prior art will be briefly described below, and it is obvious that the drawings in the following description are only embodiments of the present application, and that other drawings can be obtained according to the provided drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic flow chart of a data mining method according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a data mining apparatus according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
The terms "first," "second," "third," "fourth" and the like in the description and in the claims and in the above drawings, if any, are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments described herein may be implemented in other sequences than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
With the popularization of the internet and the application of large data technology, large enterprises and service organizations have acquired a large amount of data, such as patient diagnosis data sets established by medical institutions, customer online transaction data sets collected by e-commerce enterprises, customer information and transaction data stored by financial companies, and the like. Enterprises or institutions analyze the data sets, can obtain more valuable knowledge, then provide better services for clients, and improve living standards. However, such data sets store a large amount of data related to personal privacy, such as identity information, address information, communication information, etc., and privacy revealing events are very likely to occur.
The existing method for improving the security of the private data is generally that a data processing platform which is expected to collect the private data for data mining can comply with laws and regulations, and does not actively reveal the private data. However, once the data processing platform leaks the private data, a serious threat is posed to the security of the private data.
Therefore, in view of the above problems, embodiments of the present application provide a data mining method, apparatus, device, and readable storage medium, which can improve security of private data.
Referring to fig. 1, a data mining method provided by an embodiment of the present application is applicable to a data processing platform, and includes the following steps.
S101, receiving a data mining request.
In this embodiment, the data processing platform may first receive a data mining request sent by a user, so as to mine the data to be mined. It is understood that the data mining request includes identification information of the target privacy-distorting data. The user can send a data mining request containing identification information to the data processing platform through the terminal equipment to realize data mining on the target privacy distortion data.
S102, determining target privacy distortion data from a privacy distortion database according to the identification information, wherein the privacy distortion database comprises a plurality of privacy distortion data, and the privacy distortion data is obtained by performing distortion processing on the privacy data by a client.
In this embodiment, after receiving a data mining request including identification information, the data processing platform may determine target privacy distortion data from a privacy distortion database according to the identification information, where the privacy distortion database includes a plurality of privacy distortion data, where the privacy distortion data is obtained by performing distortion processing on the privacy data by a client. It is understood that the privacy distortion database for storing privacy distortion data may be constructed in advance. The client can randomly divide the complete privacy data of the user, and performs light and personalized distortion processing on each part to obtain corresponding distortion data, and then sends the distortion data to the data collection platform for storage and data mining processing. The data processing platform can only collect the privacy distortion data, but not collect the complete privacy data, so that the problem of privacy data safety caused by revealing the privacy data is avoided.
In one possible implementation, initial privacy-distorted data sent by a client may be received; normalizing the initial privacy data to obtain privacy distortion data; the privacy distortion data is stored in a privacy distortion database. It can be understood that, in order to facilitate better data mining and improve the data mining efficiency, preprocessing such as normalization processing can be performed on the initial privacy distortion data sent by the client, and used parameters are recorded to unify the format of the privacy distortion data, and finally, the privacy distortion data after normalization processing is stored in the privacy distortion database so as to be convenient for calling during data mining in the follow-up process.
S103, inputting the target privacy distortion data into a target data mining model to obtain an analysis result of the target privacy distortion data.
In this embodiment, after determining the target privacy distortion data, the target privacy distortion data may be input into the target data mining model, to obtain an analysis result of the target privacy distortion data. It can be appreciated that a target data mining model capable of performing data mining on the privacy distortion data may be pre-trained, so as to perform data mining on the target privacy distortion data, and obtain an analysis result of the target privacy distortion data, where the analysis result may include data association information and the like.
In one possible implementation, the original data mining model may be determined first; acquiring privacy distortion data to be trained and analysis results of the privacy distortion data to be trained; training the original data mining model according to the privacy distortion data to be trained and the analysis result of the privacy distortion data to be trained to obtain a target data mining model. It can be understood that an original data mining model can be determined from various data mining models, then a training data set comprising the privacy distortion data to be trained and the analysis result of the privacy distortion data to be trained is obtained to train the original data mining model, so that a target data mining model is obtained, data mining can be performed only according to the privacy distortion data, complete privacy data of a user is not required to be obtained, and the problem of privacy data safety caused by leakage of the privacy data by a data processing platform is avoided.
Specifically, the raw data mining model may include one or more of a regression analysis model, a decision tree model, an artificial neural network model, a bayesian network model, a support vector machine model, a clustering model, an association model, and the like. It can be understood that, in order to improve diversity and comprehensiveness of data mining, one or more models selected from a regression analysis model, a decision tree model, an artificial neural network model, a bayesian network model, a support vector machine model, a clustering model, an association model and the like can be selected as an original data mining model to train according to actual requirements, so that analysis results of data mining can contain various relevant information of data, and diversity and comprehensiveness of data mining are improved.
In one possible implementation manner, in order to further improve the accuracy of data mining, the privacy distortion data to be tested and the analysis result of the privacy distortion data to be tested may be obtained; inputting the privacy distortion data to be tested into a target data mining model to obtain an analysis result to be verified; determining the accuracy of the target data mining model according to the analysis result to be verified and the analysis result of the privacy distortion data to be tested; and if the accuracy is lower than the preset threshold value, the step of determining the original data mining model is re-executed. It can be understood that the trained target data mining model can be tested by acquiring test set data comprising privacy distortion data to be tested and privacy distortion data analysis results to be tested, and the accuracy of the target data mining model is determined by comparing the analysis results to be verified output by the target data mining model with the marked privacy distortion data analysis results to be tested; if the accuracy is higher than the preset threshold, the accuracy of the target data mining model is qualified, and the trained target data mining model can be directly used; and if the accuracy of the target data mining model is lower than the preset threshold, the accuracy of the target data mining model is unqualified, and at the moment, the model can be retrained by redefining the original data mining model or redefining the training data set until the accuracy of the trained target data mining model is higher than the preset threshold, so that the accuracy of the data mining is improved.
Therefore, in the embodiment of the application, the data mining method is provided, and the complete privacy data is not required to be obtained from the client side when the data mining is performed, but the data mining is performed only according to the privacy distortion data, so that even if the data is leaked, the data processing platform also distorts the data instead of the complete privacy data, and the security of the privacy data is improved.
Referring to fig. 2, the embodiment of the application further provides a data mining apparatus, which includes:
a receiving unit 201, configured to receive a data mining request, where the data mining request includes identification information of target privacy distortion data;
a first determining unit 202, configured to determine target privacy distortion data from a privacy distortion database according to the identification information, where the privacy distortion database includes a plurality of privacy distortion data, and the privacy distortion data is obtained by performing distortion processing on the privacy data by a client;
and an input unit 203, configured to input the target privacy distortion data into a target data mining model, and obtain an analysis result of the target privacy distortion data.
Optionally, the apparatus further comprises:
the receiving unit 201 is configured to receive initial privacy distortion data sent by a client;
the processing unit is used for carrying out normalization processing on the initial privacy data to obtain privacy distortion data;
and the storage unit is used for storing the privacy distortion data in a privacy distortion database.
Optionally, the apparatus further comprises:
the second determining unit is used for determining an original data mining model;
the acquisition unit is used for acquiring the privacy distortion data to be trained and the analysis result of the privacy distortion data to be trained;
the training unit is used for training the original data mining model according to the privacy distortion data to be trained and the analysis result of the privacy distortion data to be trained to obtain the target data mining model.
Optionally, the apparatus further comprises:
the acquisition unit is further used for acquiring privacy distortion data to be tested and an analysis result of the privacy distortion data to be tested;
the input unit 203 is further configured to input the privacy distortion data to be tested into the target data mining model, to obtain an analysis result to be verified;
the third determining unit is used for determining the accuracy of the target data mining model according to the analysis result to be verified and the analysis result of the privacy distortion data to be tested;
and the execution unit is used for re-executing the step of determining the original data mining model if the accuracy is lower than a preset threshold.
Optionally, the raw data mining model includes one or more of a regression analysis model, a decision tree model, an artificial neural network model, a bayesian network model, a support vector machine model, a clustering model, and an association model.
Therefore, in the embodiment of the application, the data mining device is provided, and the complete privacy data is not required to be obtained from the client side when the data is mined, but the data mining is only carried out according to the privacy distortion data, so that even if the data is leaked, the data processing platform also distorts the data instead of the complete privacy data, and the security of the privacy data is improved.
The embodiment of the application also provides computer equipment, which comprises: a memory, a processor, and a bus system;
wherein the memory is used for storing programs;
the processor is used for executing the program in the memory so as to realize any one of the data mining methods;
the bus system is used for connecting the memory and the processor so as to enable the memory and the processor to communicate.
The embodiments of the present application also provide a computer readable storage medium storing instructions that, when executed on a computer, cause the computer to perform any of the data mining methods described above.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, which are not repeated herein.
In the several embodiments provided in the present application, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be embodied essentially or in part or all of the technical solution or in part in the form of a software product stored in a storage medium, including instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a read-only memory (ROM), a random access memory (random access memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
It should be specifically noted that the data mining method, device, equipment and readable storage medium provided by the application can be used in the big data field or the financial field. The foregoing is merely exemplary, and the application fields of the data mining method, apparatus, device and readable storage medium provided by the present application are not limited.
Finally, it is further noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. A method of data mining, the method comprising:
receiving a data mining request, wherein the data mining request comprises identification information of target privacy distortion data;
determining target privacy distortion data from a privacy distortion database according to the identification information, wherein the privacy distortion database comprises a plurality of privacy distortion data, and the privacy distortion data is obtained by performing distortion processing on the privacy data by a client;
and inputting the target privacy distortion data into a target data mining model to obtain an analysis result of the target privacy distortion data.
2. The method according to claim 1, wherein the method further comprises:
receiving initial privacy distortion data sent by a client;
normalizing the initial privacy data to obtain privacy distortion data;
the privacy distortion data is stored in a privacy distortion database.
3. The method according to claim 1, wherein the method further comprises:
determining an original data mining model;
acquiring privacy distortion data to be trained and an analysis result of the privacy distortion data to be trained;
and training the original data mining model according to the privacy distortion data to be trained and the analysis result of the privacy distortion data to be trained to obtain the target data mining model.
4. A method according to claim 3, characterized in that the method further comprises:
acquiring privacy distortion data to be tested and an analysis result of the privacy distortion data to be tested;
inputting the privacy distortion data to be tested into the target data mining model to obtain an analysis result to be verified;
determining the accuracy of the target data mining model according to the analysis result to be verified and the analysis result of the privacy distortion data to be tested;
and if the accuracy is lower than a preset threshold, re-executing the step of determining the original data mining model.
5. The method of claim 3 or 4, wherein the raw data mining model comprises one or more of a regression analysis model, a decision tree model, an artificial neural network model, a bayesian network model, a support vector machine model, a cluster model, and an association model.
6. A data mining apparatus, the apparatus comprising:
a receiving unit configured to receive a data mining request, where the data mining request includes identification information of target privacy distortion data;
the first determining unit is used for determining target privacy distortion data from a privacy distortion database according to the identification information, wherein the privacy distortion database comprises a plurality of privacy distortion data, and the privacy distortion data is obtained by performing distortion processing on the privacy data by a client;
and the input unit is used for inputting the target privacy distortion data into a target data mining model to obtain an analysis result of the target privacy distortion data.
7. The apparatus of claim 6, wherein the apparatus further comprises:
the receiving unit is used for receiving the initial privacy distortion data sent by the client;
the processing unit is used for carrying out normalization processing on the initial privacy data to obtain privacy distortion data;
and the storage unit is used for storing the privacy distortion data in a privacy distortion database.
8. The apparatus of claim 6, wherein the apparatus further comprises:
the second determining unit is used for determining an original data mining model;
the acquisition unit is used for acquiring the privacy distortion data to be trained and the analysis result of the privacy distortion data to be trained;
the training unit is used for training the original data mining model according to the privacy distortion data to be trained and the analysis result of the privacy distortion data to be trained to obtain the target data mining model.
9. A computer device, comprising: a memory, a processor, and a bus system;
wherein the memory is used for storing programs;
the processor being adapted to execute a program in the memory to implement the method of any one of claims 1 to 5;
the bus system is used for connecting the memory and the processor so as to enable the memory and the processor to communicate.
10. A computer readable storage medium storing instructions which, when run on a computer, cause the computer to perform the method of any one of claims 1 to 5.
CN202311074599.9A 2023-08-24 2023-08-24 Data mining method, device, equipment and readable storage medium Pending CN117113402A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311074599.9A CN117113402A (en) 2023-08-24 2023-08-24 Data mining method, device, equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311074599.9A CN117113402A (en) 2023-08-24 2023-08-24 Data mining method, device, equipment and readable storage medium

Publications (1)

Publication Number Publication Date
CN117113402A true CN117113402A (en) 2023-11-24

Family

ID=88797882

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311074599.9A Pending CN117113402A (en) 2023-08-24 2023-08-24 Data mining method, device, equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN117113402A (en)

Similar Documents

Publication Publication Date Title
CN108156237B (en) Product information pushing method and device, storage medium and computer equipment
CN110992167A (en) Bank client business intention identification method and device
CN110378749B (en) Client similarity evaluation method and device, terminal equipment and storage medium
CN109345417B (en) Online assessment method and terminal equipment for business personnel based on identity authentication
CN107423613A (en) The method, apparatus and server of device-fingerprint are determined according to similarity
CN110717189A (en) Data leakage identification method, device and equipment
CN110348471B (en) Abnormal object identification method, device, medium and electronic equipment
US20180101913A1 (en) Entropic link filter for automatic network generation
CN116452329A (en) Abnormal behavior monitoring method and device, electronic equipment and storage medium
CN112100660A (en) Method and device for detecting sensitive information of log file
CN112950359B (en) User identification method and device
CN117252429A (en) Risk user identification method and device, storage medium and electronic equipment
CN117033205A (en) Flow playback comparison test method and device
CN111340062A (en) Mapping relation determining method and device
CN117113402A (en) Data mining method, device, equipment and readable storage medium
CN114065194A (en) Method and device for detecting abnormal interface application, electronic equipment and storage medium
RU2702275C1 (en) Method and system for marking user actions for subsequent analysis and accumulation
CN107818390A (en) A kind of check requirements generation method and device
CN111984798A (en) Atlas data preprocessing method and device
CN110458508A (en) Processing method, processing unit and the Related product of document information
CN112862493B (en) Intelligent Pompe deception detection method, device, terminal and storage medium
CN114626058B (en) Method and system for identifying malicious community access behaviors
Kariuki East African Journal of Information Technology
CN116485536A (en) Transaction behavior recognition method and device based on deep forest model and electronic equipment
CN117312683A (en) Method, system and medium for rapidly adding friends through multiple channels

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination