WO2021212377A1 - Method and apparatus for determining risky attribute of user data, and electronic device - Google Patents

Method and apparatus for determining risky attribute of user data, and electronic device Download PDF

Info

Publication number
WO2021212377A1
WO2021212377A1 PCT/CN2020/086194 CN2020086194W WO2021212377A1 WO 2021212377 A1 WO2021212377 A1 WO 2021212377A1 CN 2020086194 W CN2020086194 W CN 2020086194W WO 2021212377 A1 WO2021212377 A1 WO 2021212377A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
user data
hidden state
decoded
matrix
Prior art date
Application number
PCT/CN2020/086194
Other languages
French (fr)
Chinese (zh)
Inventor
李森林
Original Assignee
深圳市欢太数字科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市欢太数字科技有限公司 filed Critical 深圳市欢太数字科技有限公司
Priority to PCT/CN2020/086194 priority Critical patent/WO2021212377A1/en
Priority to CN202080094382.2A priority patent/CN115066699A/en
Publication of WO2021212377A1 publication Critical patent/WO2021212377A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/04Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"

Definitions

  • This application relates to the technical field of electronic equipment, and more specifically, to a method and device for determining dangerous attributes of user data, and electronic equipment.
  • this application proposes a method, device and electronic equipment for determining the dangerous attributes of user data to solve the above-mentioned problems.
  • an embodiment of the present application provides a method for determining a dangerous attribute of user data.
  • the method includes: acquiring user data, where the user data includes time data and characteristic data that have a corresponding relationship; Encoding to obtain the encoded data of the user data, the encoded data including the temporal and spatial hidden state and the feature space hidden state; based on the two-way attention mechanism, the temporal and spatial hidden state and the feature space hidden state are calculated to obtain Two-way attention matrix; generate data to be decoded based on the two-way attention matrix and the encoded data; decode the data to be decoded to obtain the decoded data of the user data, and determine the decoded data based on the decoded data Dangerous attributes of user data.
  • an embodiment of the present application provides a device for determining a dangerous attribute of user data.
  • the device includes: a user data acquisition module for acquiring user data.
  • the user data includes time data and characteristic data that have a corresponding relationship.
  • Coded data obtaining module used to code said user data to obtain coded data of said user data, said coded data including time-space hidden state and feature space hidden state;
  • two-way attention matrix obtaining module used for A two-way attention mechanism, which calculates the hidden state of the time space and the hidden state of the feature space to obtain a two-way attention matrix;
  • a data generation module to be decoded is used to generate the two-way attention matrix and the encoded data Data to be decoded;
  • a dangerous attribute determination module configured to decode the data to be decoded, obtain decoded data of the user data, and determine the dangerous attribute of the user data based on the decoded data.
  • an embodiment of the present application provides an electronic device, including a memory and a processor, the memory is coupled to the processor, the memory stores instructions, and the instructions are executed when the instructions are executed by the processor.
  • the processor executes the above method.
  • an embodiment of the present application provides a computer readable storage medium, and the computer readable storage medium stores program code, and the program code can be invoked by a processor to execute the above method.
  • the method, device, and electronic device for determining the dangerous attributes of user data obtain user data, and the user data includes time data and characteristic data that have a corresponding relationship, and the user data is encoded to obtain the encoded data of the user data.
  • the coded data includes time and space hidden state and feature space hidden state. Based on the two-way attention mechanism, the time and space hidden state and feature space hidden state are calculated to obtain a two-way attention matrix.
  • the two-way attention mechanism Based on the two-way attention matrix and the coded data, generate to be decoded Data, decode the data to be decoded, obtain the decoded data of the user data, and determine the dangerous attributes of the user data based on the decoded data, so as to design the two-way attention mechanism and embed it into the encoding-decoding structure to mine the dangerous attributes of the user data.
  • the hidden state of time and space and the hidden state of feature space are integrated to represent attention, which improves the accuracy of judging the dangerous attributes of user data.
  • FIG. 1 shows a schematic flowchart of a method for determining a dangerous attribute of user data provided by an embodiment of the present application
  • Figure 2 shows a schematic diagram of encoding-decoding of user data provided by an embodiment of the present application
  • FIG. 3 shows a schematic flowchart of a method for determining a dangerous attribute of user data provided by another embodiment of the present application
  • FIG. 4 shows a schematic flowchart of step S203 of the method for determining the dangerous attribute of user data shown in FIG. 3 of the present application;
  • FIG. 5 shows a schematic flowchart of step S204 of the method for determining a dangerous attribute of user data shown in FIG. 3 of the present application;
  • FIG. 6 shows a schematic flowchart of step S205 of the method for determining the dangerous attributes of user data shown in FIG. 3 of the present application;
  • FIG. 7 shows a schematic flowchart of a method for determining a dangerous attribute of user data provided by still another embodiment of the present application.
  • Fig. 8 shows a block diagram of a device for determining a dangerous attribute of user data provided by an embodiment of the present application
  • FIG. 9 shows a block diagram of an electronic device used to execute a method for determining a dangerous attribute of user data according to an embodiment of the present application
  • Fig. 10 shows a storage unit for storing or carrying program codes for implementing the method for determining the dangerous attributes of user data according to the embodiment of the present application.
  • the current behavioral series models are divided into two categories: 1) Behavioral sequence models based on non-linear autoregressive models (NARX), such as recurrent neural networks (RNN) and its variants, long and short-term memory networks (LSTM), gated recurrent units ( GRU), etc.; 2) On the basis of NARX, an attention mechanism is introduced to control the dependence of tags on different inputs.
  • NARX non-linear autoregressive models
  • RNN recurrent neural networks
  • LSTM long and short-term memory networks
  • GRU gated recurrent units
  • the attention mechanism-based model has received more attention because it can perceive global information.
  • the attention mechanism is a type of neural network that is embedded in the neural network to judge differences.
  • the algorithm for input weights although the attention mechanism has a global vision, but the current attention mechanism-based models can only be modeled from the time dimension or feature dimension alone, thus ignoring the behavioral series in the time-feature cross dimension. information.
  • the two-way attention mechanism is designed to be embedded in the encoding-decoding structure for mining
  • the dangerous attributes of user data integrate the hidden state of time and space and the hidden state of feature space to represent attention, and improve the accuracy of judging the dangerous attributes of user data.
  • the specific method for determining the dangerous attribute of the user data will be described in detail in the subsequent embodiments.
  • FIG. 1 shows a schematic flowchart of a method for determining a dangerous attribute of user data provided by an embodiment of the present application.
  • the method for determining the dangerous data of user data is used to mine the dangerous attributes of user data by designing a two-way attention mechanism and embedding it into the encoding-decoding structure, and integrate the hidden state of time and space and the hidden state of feature space to represent attention, Improve the accuracy of determining the dangerous attributes of user data.
  • the method for determining the dangerous attribute of user data is applied to the device 200 for determining the dangerous attribute of user data as shown in FIG. 8 and the electronic equipment 100 (FIG. 9 ). The following will take an electronic device as an example to describe the specific process of this embodiment.
  • the electronic device applied in this embodiment may be a smart phone, a tablet computer, a wearable electronic device, etc., which is not limited here.
  • the facet will elaborate on the process shown in Figure 1.
  • the method for determining the dangerous attributes of the user data may specifically include the following steps:
  • Step S101 Obtain user data, where the user data includes time data and characteristic data that have a corresponding relationship.
  • user data can be obtained.
  • user data can be obtained in real time, user data can be obtained at preset time intervals, user data can be obtained at a specified time, or user data can be obtained according to other preset rules. This is not limited.
  • user data can be obtained locally from the electronic device (the electronic device pre-records and stores user data), user data can be obtained from a server connected to the electronic device (the server pre-records and stores user data), etc. Not limited.
  • the user data includes time data and characteristic data that have a corresponding relationship, where the time data can use months as the time period, weeks as the time period, days as the time period, or hours as the time. Period, etc., for example, when the time data takes months as the time period, the user data can include the characteristic data in xx months; when the time data takes the week as the time period, the user data can include the characteristic data in xx weeks ; When the time data takes the day as the time period, the user data can include the characteristic data in xx days; when the user data takes the hour as the time period, the user data can include the characteristic data in the xx time period, etc., here Not limited.
  • the characteristic data may include attribute data, behavior data, and the like.
  • the attribute data may include, but is not limited to: age data, gender data, geographic location data, and hobby data.
  • the behavior data may include, but is not limited to: login data, browsing data, click data, jump data, payment data, and evaluation data.
  • the acquired user data may include: the user’s age data, gender data, geographic location data, hobby data, login data, browsing data, click data, jump data, payment data, Evaluation data; the user’s age data, gender data, geographic location data, hobby data, login data, browsing data, click data, jump data, payment data, evaluation data, etc. within xx months are not limited here.
  • Step S102 Encode the user data to obtain encoded data of the user data, where the encoded data includes a time-space hidden state and a feature-space hidden state.
  • the user data after acquiring user data, the user data may be encoded (Encoder) to obtain the encoded data of the user data, where the acquired encoded data may include temporal and spatial hidden states and feature space hidden states.
  • Encoder encoded
  • FIG. 2 shows a schematic diagram of encoding-decoding of user data provided by an embodiment of the present application. As shown in FIG.
  • the user data is Encoder
  • the encoded data output during the Encoder process Is the hidden state of RNN
  • T represents the length of the sequence
  • M represents the length of the hidden state
  • Identify the hidden state of encoded data with sequence length T and hidden state length M where, Indicates the hidden state of all channels at time t th , that is, the hidden state of the feature space, Indicates the hidden state of the m th channel at all time points, that is, the hidden state of time and space, as shown in A in Figure 2.
  • Step S103 Based on the two-way attention mechanism, calculate the time-space hidden state and the feature space hidden state to obtain a two-way attention matrix.
  • the time-space hidden state and the feature-space hidden state can be calculated based on the two-way attention mechanism to obtain a two-way attention matrix.
  • the first weighted calculation is performed on the hidden state of time and space
  • the second weighted calculation is performed on the hidden state of feature space to obtain Two-way attention matrix.
  • the time-space hidden state and the feature-space hidden state can be weighted based on the two-way attention mechanism, and the corresponding fully connected layer and softmax can be used for labeling. Mapping to obtain a two-way attention matrix.
  • Step S104 Generate data to be decoded based on the two-way attention matrix and the encoded data.
  • the data to be decoded can be generated based on the bidirectional attention matrix and the coded data.
  • the bidirectional attention matrix and the encoded data can be calculated to obtain the data to be decoded.
  • Step S105 Decode the data to be decoded, obtain decoded data of the user data, and determine the dangerous attribute of the user data based on the decoded data.
  • the data to be decoded can be decoded (Decoder) to obtain the decoded data of the user data, and the dangerous attributes of the user data can be determined based on the decoded data.
  • the two-way attention mechanism integrates time-space and feature-space information, it can extend the dimensionality of the attention mechanism's global vision, thereby more accurately mapping label information from different features at the same time and the same feature series at different times.
  • Obtaining the decoded data makes the risk attributes of the user data determined based on the decoded data more accurate.
  • determining the risk attribute of the user data based on the decoded data may be determining that the user data is dangerous based on the decoded data, or determining that the user data is not dangerous based on the decoded data. In some embodiments, determining the risk attribute of the user data based on the decoded data may be determining the risk level of the user data based on the decoded data, for example, determining that the risk level of the user data is high based on the decoded data, and determining the risk level of the user data based on the decoded data It is medium to high, the risk level of user data is determined to be medium based on decoded data, the risk level of user data is determined to be medium to low based on decoded data, and the risk level of user data is determined to be low based on decoded data, etc., which are not limited here.
  • the method for determining the dangerous attributes of user data obtains user data.
  • the user data includes time data and characteristic data that have a corresponding relationship.
  • the user data is encoded to obtain the encoded data of the user data.
  • the encoded data includes time. Spatial hidden state and feature space hidden state, based on the two-way attention mechanism, calculate the time-space hidden state and feature space hidden state to obtain a two-way attention matrix, based on the two-way attention matrix and encoded data, generate data to be decoded, and to be decoded
  • the data is decoded to obtain the decoded data of the user data, and the dangerous attributes of the user data are determined based on the decoded data.
  • the two-way attention mechanism is designed to be embedded in the encoding-decoding structure to mine the dangerous attributes of the user data and hide the time and space.
  • the hidden state of state and feature space integrates and represents attention, which improves the accuracy of judging the dangerous attributes of user data.
  • FIG. 3 shows a schematic flowchart of a method for determining a dangerous attribute of user data provided by another embodiment of the present application.
  • the following will elaborate on the process shown in FIG. 3, and the method for determining the dangerous attributes of the user data may specifically include the following steps:
  • Step S201 Obtain user data, where the user data includes time data and characteristic data that have a corresponding relationship.
  • Step S202 Encode the user data to obtain encoded data of the user data, where the encoded data includes a time-space hidden state and a feature-space hidden state.
  • step S201 to step S202 please refer to step S101 to step S102, which will not be repeated here.
  • Step S203 Based on the two-way attention mechanism, calculate the temporal and spatial hidden state to obtain the first fully connected layer.
  • the time and space hidden state can be calculated based on the two-way attention mechanism to obtain the first fully connected layer, as shown in B in FIG. 2.
  • FIG. 4 shows a schematic flowchart of step S203 of the method for determining the dangerous attribute of user data shown in FIG. 3 of the present application.
  • the following will elaborate on the process shown in FIG. 4, and the method may specifically include the following steps:
  • Step S2031 Obtain the first weight coefficient matrix.
  • the first weight coefficient matrix after obtaining the temporal and spatial hidden state, can be obtained based on the two-way attention mechanism. Among them, the first weight coefficient matrix can be learned during the training process. In some embodiments, the first weight coefficient matrix may be obtained in the training process and then stored locally in the electronic device, and after obtaining the temporal and spatial hidden state, the first weight coefficient matrix may be directly obtained locally from the electronic device. In another embodiment, the first weight coefficient matrix may be obtained during the training process and stored in a server connected to the electronic device in communication, and after obtaining the temporal and spatial hidden state, the first weight coefficient matrix may be obtained from the server through a wireless network or a data network. A matrix of weight coefficients.
  • Step S2032 Calculate the first weight coefficient matrix and the temporal and spatial hidden state to obtain a first fully connected layer.
  • the first weight coefficient matrix and the temporal and spatial hidden state can be calculated to obtain the first fully connected layer. In some embodiments, it can be based on Calculate the first weight coefficient matrix and the time-space hidden state to obtain the first fully connected layer ⁇ t , where W ⁇ is the first weight coefficient matrix, It is the hidden state of time and space. In some embodiments, the first weight coefficient matrix is
  • Step S204 Based on the two-way attention mechanism, calculate the hidden state of the feature space to obtain a second fully connected layer.
  • the hidden state of the feature space can be calculated based on the bidirectional attention mechanism to obtain the second fully connected layer, as shown in C in FIG. 2.
  • FIG. 5 shows a schematic flowchart of step S204 of the method for determining the dangerous attribute of user data shown in FIG. 3 of the present application.
  • the following will elaborate on the process shown in FIG. 5, and the method may specifically include the following steps:
  • Step S2041 Obtain a second weight coefficient matrix.
  • the second weight coefficient matrix after obtaining the hidden state of the feature space, can be obtained based on the two-way attention mechanism. Wherein, the second weight coefficient matrix can be learned during the training process. In some embodiments, the second weighting coefficient matrix may be obtained in the training process and then stored locally in the electronic device, and after obtaining the hidden state of the feature space, the second weighting coefficient matrix may be directly obtained locally from the electronic device. In another embodiment, the second weight coefficient matrix may be obtained during the training process and then stored in a server that is communicatively connected to the electronic device, and after obtaining the hidden state of the feature space, the second weight coefficient matrix may be obtained from the server through a wireless network or a data network. Two-weight coefficient matrix.
  • Step S2042 Calculate the second weight coefficient matrix and the hidden state of the feature space to obtain a second fully connected layer.
  • the second weight coefficient matrix and the hidden state of the feature space can be calculated to obtain the second fully connected layer.
  • the second weight coefficient matrix is
  • Step S205 Perform calculations on the first fully connected layer and the second fully connected layer to obtain the two-way attention matrix.
  • the first fully connected layer and the second fully connected layer can be calculated to obtain the two-way attention matrix, as shown in D in Figure 2 Show.
  • FIG. 6 shows a schematic flowchart of step S205 of the method for determining the dangerous attribute of user data shown in FIG. 3 of the present application.
  • the process shown in FIG. 6 will be described in detail below, and the method may specifically include the following steps:
  • Step S2051 Obtain a weight coefficient vector.
  • the weight coefficient vector after obtaining the first fully connected layer and the second fully connected layer, can be obtained based on the two-way attention mechanism. Among them, the weight coefficient vector can be learned during the training process. In some embodiments, the weight coefficient vector may be obtained in the training process and then stored locally in the electronic device, and after obtaining the first fully connected layer and the second fully connected layer, the weight coefficient can be obtained directly from the electronic device. vector. In another embodiment, the weight coefficient vector can be obtained in the training process and then stored in the server connected to the electronic device communication, and after obtaining the first fully connected layer and the second fully connected layer, it can be passed through a wireless network or a data network. Obtain the weight coefficient vector from the server.
  • Step S2052 Calculate the weight coefficient vector, the first fully connected layer, and the second fully connected layer to obtain the bidirectional attention matrix.
  • the weight coefficient vector, the first fully connected layer, and the second fully connected layer can be calculated to obtain the bidirectional attention matrix.
  • the weight coefficient vector is
  • the two-way attention matrix r t m since the two-way attention matrix r t m integrates the first fully connected layer ⁇ t and the second fully connected layer ⁇ m at the same time, the two-way attention matrix r t m has both time, space, and time.
  • the distribution information of the feature space that is, the information reflected by the bidirectional attention matrix r t m is more accurate.
  • Step S206 Process the bidirectional attention matrix based on the softmax function to obtain a probability matrix.
  • the bidirectional attention matrix after obtaining the bidirectional attention matrix, can be processed based on the softmax function to obtain the probability matrix. Specifically, in order to ensure that the sum of all attention weights in the same channel is 1, Then the two-way attention matrix can be processed by the softmax function to obtain the probability matrix. In some embodiments, it can be based on Calculate the bidirectional attention matrix to obtain the probability matrix Among them, r t m is a two-way attention matrix.
  • Step S207 Generate the data to be decoded based on the probability matrix and the encoded data.
  • the probability matrix and the encoded data after obtaining the probability matrix and the encoded data, it can be based on Calculate the probability matrix and encoded data to obtain the data to be decoded in, Is probabilistic data, Is the encoded data.
  • Step S208 Decode the data to be decoded, obtain decoded data of the user data, and determine the dangerous attribute of the user data based on the decoded data.
  • step S208 please refer to step S105, which will not be repeated here.
  • a method for determining a dangerous attribute of user data is obtained.
  • the user data includes time data and characteristic data that have a corresponding relationship.
  • the user data is encoded to obtain the encoded data of the user data.
  • the encoded data includes time.
  • Space hidden state and feature space hidden state based on the two-way attention mechanism, calculate the hidden state of time and space, obtain the first fully connected layer, based on the two-way attention mechanism, calculate the hidden state of feature space, obtain the second fully connected layer , Calculate the first fully connected layer and the second fully connected layer to obtain a two-way attention matrix, process the two-way attention matrix based on the softmax function to obtain a probability matrix, and generate the data to be decoded based on the probability matrix and the encoded data.
  • the decoded data is decoded to obtain the decoded data of the user data, and the dangerous attributes of the user data are determined based on the decoded data.
  • this embodiment also calculates the hidden state of time and space and the hidden state of feature space respectively to obtain two different fully connected layers based on two different fully connected layers.
  • the connection layer obtains a two-way attention matrix to improve the accuracy of judging the dangerous attributes of the user data.
  • FIG. 7 shows a schematic flowchart of a method for determining a dangerous attribute of user data provided by another embodiment of the present application.
  • the process shown in FIG. 7 will be described in detail below.
  • the method for determining the dangerous attributes of the user data may specifically include the following steps:
  • Step S301 Obtain user data, where the user data includes time data and characteristic data that have a corresponding relationship.
  • Step S302 Encode the user data to obtain encoded data of the user data, where the encoded data includes a time-space hidden state and a feature-space hidden state.
  • Step S303 Based on the two-way attention mechanism, calculate the time-space hidden state and the feature space hidden state to obtain a two-way attention matrix.
  • Step S304 Generate data to be decoded based on the two-way attention matrix and the encoded data.
  • Step S305 Decode the data to be decoded to obtain decoded data of the user data.
  • step S301 to step S305 please refer to step S101 to step S105, which will not be repeated here.
  • Step S306 When the decoded data is the first data, it is determined that the dangerous attribute of the user data is dangerous.
  • the first data and the second data may be set in advance, where the first data may be used to characterize the risk attribute of the user data corresponding to the decoded data as dangerous, and the second data may be used to characterize the interface data
  • the dangerous attribute of the corresponding user data is not dangerous.
  • the first data may be "1" and the second data may be "0".
  • the decoded data can be compared with the first data and the second data, respectively, to determine whether the decoded data is the first data or the second data.
  • the comparison result characterizes that the decoded data is the first data, for example, when it is determined that the decoded data is "1", it can be determined that the user attribute of the user data corresponding to the decoded data is dangerous.
  • Step S307 When the information request corresponding to the user data is received, the information request is rejected.
  • the attribute information of the user data when it is determined that the attribute information of the user data is dangerous, it characterizes that the operation performed by the user is a dangerous operation or the user's behavior is a dangerous behavior, and then when the information request corresponding to the user data is received, refuse This information is requested to avoid dangerous operations or dangerous behaviors.
  • Step S308 Send an alarm prompt message, and add the user data to the blacklist.
  • the alarm prompt information can include voice alarm prompt information, text alarm prompt information, picture alarm prompt information, etc.
  • the alarm prompt information can be directly output on the electronic device, or the alarm information can be sent to the server for output through the electronic device. This is not limited.
  • the user data when it is determined that the attribute information of the user data is dangerous, it characterizes that the operation performed by the user is a dangerous operation or the behavior of the user is a dangerous behavior, the user data can be added to the blacklist to directly reject Any operation of the user data to avoid dangerous operations or dangerous behaviors.
  • the number of times the attribute information of the user data is dangerous can be obtained based on the historical information of the user data, and the attribute information of the user data is the number of times dangerous.
  • the specified number of times such as 3 times
  • the user data is added to the blacklist, and when the attribute information of the user data is dangerous and the specified number of times is not reached, an alarm message is issued.
  • Step S309 When the decoded data is the second data, it is determined that the dangerous attribute of the user data is not dangerous.
  • the decoded data can be compared with the first data and the second data, respectively, to determine whether the decoded data is the first data or the second data. Wherein, when the comparison result indicates that the decoded data is the second data, for example, when it is determined that the decoded data is "0", it can be determined that the user attribute of the user data corresponding to the decoded data is not dangerous.
  • Step S310 When receiving the information request corresponding to the user data, respond to the information request.
  • the information request corresponding to the user data is received At the time, respond to the information request to respond to the user's request normally to meet the user's needs.
  • a method for determining a dangerous attribute of user data is obtained.
  • the user data includes time data and characteristic data that have a corresponding relationship.
  • the user data is encoded to obtain the encoded data of the user data.
  • the encoded data includes Time and space hidden state and feature space hidden state, based on the two-way attention mechanism, calculate the time and space hidden state and feature space hidden state to obtain a two-way attention matrix, based on the two-way attention matrix and encoded data, generate the data to be decoded, and treat
  • the decoded data is decoded to obtain the decoded data of the user data.
  • the dangerous attribute of the user data is determined to be dangerous.
  • this embodiment also rejects the information request corresponding to the user data when the dangerous attribute of the user data is determined to be dangerous, and when the dangerous data of the user data is not dangerous Respond to the information request corresponding to the user data to improve the accuracy of determining the dangerous attributes of the user data.
  • FIG. 8 shows a block diagram of a device 200 for determining a dangerous attribute of user data provided by an embodiment of the present application.
  • the device 200 for determining the dangerous attributes of user data includes: a user data acquisition module 210, an encoded data acquisition module 220, a bidirectional attention matrix acquisition module 230, and a to-be-decoded data generation module 240 And the dangerous attribute determination module 250, in which:
  • the user data acquisition module 210 is configured to acquire user data, and the user data includes time data and characteristic data that have a corresponding relationship.
  • the coded data obtaining module 220 is configured to code the user data to obtain coded data of the user data, and the coded data includes a time-space hidden state and a feature-space hidden state.
  • the bidirectional attention matrix obtaining module 230 is configured to calculate the temporal and spatial hidden state and the feature space hidden state based on the bidirectional attention mechanism to obtain a bidirectional attention matrix.
  • the bidirectional attention matrix obtaining module 230 includes: a first fully connected layer obtaining submodule, a second fully connected layer obtaining submodule, and a bidirectional attention matrix obtaining submodule, wherein:
  • the first fully connected layer obtaining sub-module is used to calculate the temporal and spatial hidden state based on the two-way attention mechanism to obtain the first fully connected layer.
  • the first fully connected layer obtaining submodule includes: a first weight coefficient matrix obtaining unit and a first fully connected layer obtaining unit, wherein:
  • the first weight coefficient matrix obtaining unit is configured to obtain the first weight coefficient matrix.
  • the first fully connected layer obtaining unit is configured to calculate the first weight coefficient matrix and the temporal and spatial hidden state to obtain the first fully connected layer.
  • the first fully connected layer obtaining unit includes: a first fully connected layer obtaining subunit, wherein:
  • the first fully connected layer obtains subunits for use based on Calculate the first weight coefficient matrix and the temporal and spatial hidden state to obtain the first fully connected layer ⁇ t , where W ⁇ is the first weight coefficient matrix, It is the hidden state of time and space.
  • the second fully connected layer obtaining sub-module is used to calculate the hidden state of the feature space based on the two-way attention mechanism to obtain the second fully connected layer.
  • the second fully connected layer obtaining submodule includes: a second weight coefficient matrix obtaining unit and a second fully connected layer obtaining unit, wherein:
  • the second weight coefficient matrix obtaining unit is used to obtain the second weight coefficient matrix.
  • the second fully connected layer obtaining unit is configured to calculate the second weight coefficient matrix and the hidden state of the feature space to obtain a second fully connected layer.
  • the second fully connected layer obtaining unit includes: a second fully connected layer obtaining subunit, wherein:
  • the bidirectional attention matrix obtaining sub-module is used to calculate the first fully connected layer and the second fully connected layer to obtain the bidirectional attention matrix.
  • the bidirectional attention matrix obtaining submodule includes: a weight coefficient vector obtaining unit and a bidirectional attention matrix obtaining unit, wherein:
  • the weight coefficient vector obtaining unit is used to obtain the weight coefficient vector.
  • the bidirectional attention matrix obtaining unit is configured to calculate the weight coefficient vector, the first fully connected layer, and the second fully connected layer to obtain the bidirectional attention matrix.
  • the bidirectional attention matrix obtaining unit includes: a bidirectional attention matrix obtaining subunit, wherein:
  • the to-be-decoded data generation module 240 is configured to generate the to-be-decoded data based on the two-way attention matrix and the encoded data.
  • the to-be-decoded data generation module 240 includes: a probability matrix obtaining sub-module and a to-be-decoded data generation sub-module, wherein:
  • the probability matrix obtaining sub-module is used to process the bidirectional attention matrix based on the softmax function to obtain the probability matrix.
  • the probability matrix obtaining sub-module includes: a probability matrix obtaining unit, wherein:
  • Probability matrix acquisition unit used based on Calculate the bidirectional attention matrix to obtain the probability matrix Among them, r t m is a two-way attention matrix.
  • the to-be-decoded data generation sub-module is configured to generate the to-be-decoded data based on the probability matrix and the encoded data.
  • the to-be-decoded data generation sub-module includes: a to-be-decoded data generation unit, wherein:
  • the data generating unit to be decoded is used to generate data based on Calculate the probability matrix and the encoded data to obtain the data to be decoded in, Is probabilistic data, Is the encoded data.
  • the dangerous attribute determination module 250 is configured to decode the data to be decoded, obtain decoded data of the user data, and determine the dangerous attribute of the user data based on the decoded data.
  • the dangerous attribute determining module 250 includes: a decoding data obtaining sub-module, a first dangerous attribute determining sub-module, and a second dangerous attribute determining sub-module, wherein:
  • the decoded data obtaining sub-module is used to decode the data to be decoded to obtain decoded data of the user data.
  • the first risk attribute determination sub-module is configured to determine that the risk attribute of the user data is dangerous when the decoded data is the first data.
  • the second risk attribute determination sub-module is configured to determine that the risk attribute of the user data is not dangerous when the decoded data is the second data.
  • the dangerous attribute determining module 250 further includes: a request response sub-module, wherein:
  • the request response submodule is configured to respond to the information request when the information request corresponding to the user data is received.
  • the dangerous attribute determination module 250 further includes: a request rejection sub-module, wherein:
  • the request rejection sub-module is configured to reject the information request when the information request corresponding to the user data is received.
  • the dangerous attribute determining module 250 further includes: a prompt message issuing submodule, wherein:
  • the prompt information issuing sub-module is used for issuing alarm prompt information and adding the user data to the blacklist.
  • the coupling between the modules may be electrical, mechanical or other forms of coupling.
  • the functional modules in the various embodiments of the present application may be integrated into one processing module, or each module may exist alone physically, or two or more modules may be integrated into one module.
  • the above-mentioned integrated modules can be implemented in the form of hardware or software functional modules.
  • FIG. 9 shows a structural block diagram of an electronic device 100 provided by an embodiment of the present application.
  • the electronic device 100 may be an electronic device capable of running application programs, such as a smart phone, a tablet computer, or an e-book.
  • the electronic device 100 in this application may include one or more of the following components: a processor 110, a memory 120, and one or more application programs, where one or more application programs may be stored in the memory 120 and configured to be composed of one Or multiple processors 110 execute, and one or more programs are configured to execute the method described in the foregoing method embodiment.
  • the processor 110 may include one or more processing cores.
  • the processor 110 uses various interfaces and lines to connect various parts of the entire electronic device 100, and executes by running or executing instructions, programs, code sets, or instruction sets stored in the memory 120, and calling data stored in the memory 120.
  • Various functions and processing data of the electronic device 100 may adopt at least one of Digital Signal Processing (DSP), Field-Programmable Gate Array (FPGA), and Programmable Logic Array (PLA).
  • DSP Digital Signal Processing
  • FPGA Field-Programmable Gate Array
  • PDA Programmable Logic Array
  • the processor 110 may integrate one or a combination of a central processing unit (CPU), a graphics processing unit (GPU), a modem, and the like.
  • the CPU mainly processes the operating system, user interface, and application programs; the GPU is used for rendering and drawing the content to be displayed; the modem is used for processing wireless communication. It is understandable that the above-mentioned modem may not be integrated into the processor 110, but may be implemented by a communication chip alone.
  • the memory 120 may include random access memory (RAM) or read-only memory (Read-Only Memory).
  • the memory 120 may be used to store instructions, programs, codes, code sets or instruction sets.
  • the memory 120 may include a program storage area and a data storage area, where the program storage area may store instructions for implementing the operating system and instructions for implementing at least one function (such as touch function, sound playback function, image playback function, etc.) , Instructions used to implement the following various method embodiments, etc.
  • the storage data area can also store data (such as phone book, audio and video data, chat record data) created by the electronic device 100 during use.
  • FIG. 10 shows a structural block diagram of a computer-readable storage medium provided by an embodiment of the present application.
  • the computer-readable medium 300 stores program code, and the program code can be invoked by a processor to execute the method described in the foregoing method embodiment.
  • the computer-readable storage medium 300 may be an electronic memory such as flash memory, EEPROM (Electrically Erasable Programmable Read Only Memory), EPROM, hard disk, or ROM.
  • the computer-readable storage medium 300 includes a non-transitory computer-readable storage medium.
  • the computer-readable storage medium 300 has storage space for the program code 310 for executing any method steps in the above-mentioned methods. These program codes can be read from or written into one or more computer program products.
  • the program code 310 may be compressed in a suitable form, for example.
  • the method, device, and electronic device for determining the dangerous attributes of user data acquire user data, and the user data includes time data and characteristic data that have a corresponding relationship.
  • the user data is encoded to obtain user data.
  • the coded data includes time-space hidden state and feature-space hidden state.
  • the time-space hidden state and feature-space hidden state are calculated to obtain a two-way attention matrix, based on the two-way attention matrix and coding Data, generate the data to be decoded, decode the data to be decoded, obtain the decoded data of the user data, and determine the dangerous attributes of the user data based on the decoded data, so as to design a two-way attention mechanism and embed it into the encoding-decoding structure to mine user data It integrates the hidden state of time and space and the hidden state of feature space to represent attention, and improves the accuracy of judging the dangerous attributes of user data.

Abstract

Disclosed in the present application are a method and apparatus for determining a risky attribute of user data, and an electronic device. The method comprises: obtaining user data, the user data comprising time data and feature data having a corresponding relationship; encoding the user data to obtain encoded data of the user data, the encoded data comprising a time space hidden state and a feature space hidden state; calculating the time space hidden state and the feature space hidden state on the basis of a bidirectional attention mechanism to obtain a bidirectional attention matrix; on the basis of the bidirectional attention matrix and the encoded data, generating data to be decoded; and decoding the data to be decoded to obtain decoded data of the user data, and determining the risky attribute of the user data on the basis of the decoded data. In the present application, the bidirectional attention mechanism is embedded into an encoding-decoding structure for mining the risky attribute of the user data, and the time space hidden state and the feature space hidden state are integrated to characterize the attention, thereby improving the determining accuracy of the risky attribute of the user data.

Description

用户数据的危险属性确定方法、装置以及电子设备Method, device and electronic equipment for determining dangerous attributes of user data 技术领域Technical field
本申请涉及电子设备技术领域,更具体地,涉及一种用户数据的危险属性确定方法、装置以及电子设备。This application relates to the technical field of electronic equipment, and more specifically, to a method and device for determining dangerous attributes of user data, and electronic equipment.
背景技术Background technique
近两年我国大力发展普惠金融,使得互联网金融产业突飞猛进,在实现普惠的同时,也给黑产提供了更为方便快捷低成本的作案手段,给相关互联网金融机构带来不小压力。In the past two years, China's vigorous development of inclusive finance has enabled the Internet financial industry to advance by leaps and bounds. While achieving inclusiveness, it has also provided the black industry with a more convenient, fast and low-cost means of committing crimes, which has brought considerable pressure to relevant Internet financial institutions.
发明内容Summary of the invention
鉴于上述问题,本申请提出了一种用户数据的危险属性确定方法、装置以及电子设备,以解决上述问题。In view of the above-mentioned problems, this application proposes a method, device and electronic equipment for determining the dangerous attributes of user data to solve the above-mentioned problems.
第一方面,本申请实施例提供了一种用户数据的危险属性确定方法,所述方法包括:获取用户数据,所述用户数据包括存在对应关系的时间数据和特征数据;对所述用户数据进行编码,获得所述用户数据的编码数据,所述编码数据包括时间空间隐状态和特征空间隐状态;基于双向注意力机制,对所述时间空间隐状态和所述特征空间隐状态进行计算,获得双向注意力矩阵;基于所述双向注意力矩阵和所述编码数据,生成待解码数据;对所述待解码数据进行解码,获得所述用户数据的解码数据,并基于所述解码数据确定所述用户数据的危险属性。In the first aspect, an embodiment of the present application provides a method for determining a dangerous attribute of user data. The method includes: acquiring user data, where the user data includes time data and characteristic data that have a corresponding relationship; Encoding to obtain the encoded data of the user data, the encoded data including the temporal and spatial hidden state and the feature space hidden state; based on the two-way attention mechanism, the temporal and spatial hidden state and the feature space hidden state are calculated to obtain Two-way attention matrix; generate data to be decoded based on the two-way attention matrix and the encoded data; decode the data to be decoded to obtain the decoded data of the user data, and determine the decoded data based on the decoded data Dangerous attributes of user data.
第二方面,本申请实施例提供了一种用户数据的危险属性确定装置,所述装置包括:用户数据获取模块,用于获取用户数据,所述用户数据包括存在对应关系的时间数据和特征数据;编码数据获得模块,用于对所述用户数据进行编码,获得所述用户数据的编码数据,所述编码数据包括时间空间隐状态和特征空间隐状态;双向注意力矩阵获得模块,用于基于双向注意力机制,对所述时间空间隐状态和所述特征空间隐状态进行计算,获得双向注意力矩阵;待解码数据生成模块,用于基于所述双向注意力矩阵和所述编码数据,生成待解码数据;危险属性确定模块,用于对所述待解码数据进行解码,获得所述用户数据的解码数据,并基于所述解码数据确定所述用户数据的危险属性。In a second aspect, an embodiment of the present application provides a device for determining a dangerous attribute of user data. The device includes: a user data acquisition module for acquiring user data. The user data includes time data and characteristic data that have a corresponding relationship. Coded data obtaining module, used to code said user data to obtain coded data of said user data, said coded data including time-space hidden state and feature space hidden state; two-way attention matrix obtaining module, used for A two-way attention mechanism, which calculates the hidden state of the time space and the hidden state of the feature space to obtain a two-way attention matrix; a data generation module to be decoded is used to generate the two-way attention matrix and the encoded data Data to be decoded; a dangerous attribute determination module, configured to decode the data to be decoded, obtain decoded data of the user data, and determine the dangerous attribute of the user data based on the decoded data.
第三方面,本申请实施例提供了一种电子设备,包括存储器和处理器,所述存储器耦接到所述处理器,所述存储器存储指令,当所述指令由所述处理器执行时所述处理器执行上述方法。In a third aspect, an embodiment of the present application provides an electronic device, including a memory and a processor, the memory is coupled to the processor, the memory stores instructions, and the instructions are executed when the instructions are executed by the processor. The processor executes the above method.
第四方面,本申请实施例提供了一种计算机可读取存储介质,所述计算机可读取存储介质中存储有程序代码,所述程序代码可被处理器调用执行上述方法。In a fourth aspect, an embodiment of the present application provides a computer readable storage medium, and the computer readable storage medium stores program code, and the program code can be invoked by a processor to execute the above method.
本申请实施例提供的用户数据的危险属性确定方法、装置以及电子设备,获取用户数据,用户数据包括存在对应关系的时间数据和特征数据,对用户数据进行编码,获得用户数据的编码数据,该编码数据包括时间空间隐状态和特征空间隐状态,基于双向注 意力机制,对时间空间隐状态和特征空间隐状态进行计算,获得双向注意力矩阵,基于双向注意力矩阵和编码数据,生成待解码数据,对待解码数据进行解码,获得用户数据的解码数据,并基于解码数据确定用户数据的危险属性,从而通过设计双向注意力机制嵌入到编码-解码结构中用来挖掘用户数据的危险属性,将时间空间的隐状态和特征空间的隐状态整合表征注意力,提升用户数据的危险属性的判定准确性。The method, device, and electronic device for determining the dangerous attributes of user data provided in the embodiments of the present application obtain user data, and the user data includes time data and characteristic data that have a corresponding relationship, and the user data is encoded to obtain the encoded data of the user data. The coded data includes time and space hidden state and feature space hidden state. Based on the two-way attention mechanism, the time and space hidden state and feature space hidden state are calculated to obtain a two-way attention matrix. Based on the two-way attention matrix and the coded data, generate to be decoded Data, decode the data to be decoded, obtain the decoded data of the user data, and determine the dangerous attributes of the user data based on the decoded data, so as to design the two-way attention mechanism and embed it into the encoding-decoding structure to mine the dangerous attributes of the user data. The hidden state of time and space and the hidden state of feature space are integrated to represent attention, which improves the accuracy of judging the dangerous attributes of user data.
附图说明Description of the drawings
为了更清楚地说明本申请实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其它的附图。In order to more clearly describe the technical solutions in the embodiments of the present application, the following will briefly introduce the drawings that need to be used in the description of the embodiments. Obviously, the drawings in the following description are only some embodiments of the present application. For those skilled in the art, other drawings can be obtained from these drawings without creative work.
图1示出了本申请一个实施例提供的用户数据的危险属性确定方法的流程示意图;FIG. 1 shows a schematic flowchart of a method for determining a dangerous attribute of user data provided by an embodiment of the present application;
图2示出了本申请实施例提供的用户数据的编码-解码的示意图;Figure 2 shows a schematic diagram of encoding-decoding of user data provided by an embodiment of the present application;
图3示出了本申请又一个实施例提供的用户数据的危险属性确定方法的流程示意图;FIG. 3 shows a schematic flowchart of a method for determining a dangerous attribute of user data provided by another embodiment of the present application;
图4示出了本申请的图3所示的用户数据的危险属性确定方法的步骤S203的流程示意图;FIG. 4 shows a schematic flowchart of step S203 of the method for determining the dangerous attribute of user data shown in FIG. 3 of the present application;
图5示出了本申请的图3所示的用户数据的危险属性确定方法的步骤S204的流程示意图;FIG. 5 shows a schematic flowchart of step S204 of the method for determining a dangerous attribute of user data shown in FIG. 3 of the present application;
图6示出了本申请的图3所示的用户数据的危险属性确定方法的步骤S205的流程示意图;FIG. 6 shows a schematic flowchart of step S205 of the method for determining the dangerous attributes of user data shown in FIG. 3 of the present application;
图7示出了本申请再一个实施例提供的用户数据的危险属性确定方法的流程示意图;FIG. 7 shows a schematic flowchart of a method for determining a dangerous attribute of user data provided by still another embodiment of the present application;
图8示出了本申请实施例提供的用户数据的危险属性确定装置的模块框图;Fig. 8 shows a block diagram of a device for determining a dangerous attribute of user data provided by an embodiment of the present application;
图9示出了本申请实施例用于执行根据本申请实施例的用户数据的危险属性确定方法的电子设备的框图;FIG. 9 shows a block diagram of an electronic device used to execute a method for determining a dangerous attribute of user data according to an embodiment of the present application;
图10示出了本申请实施例的用于保存或者携带实现根据本申请实施例的用户数据的危险属性确定方法的程序代码的存储单元。Fig. 10 shows a storage unit for storing or carrying program codes for implementing the method for determining the dangerous attributes of user data according to the embodiment of the present application.
具体实施方式Detailed ways
为了使本技术领域的人员更好地理解本申请方案,下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述。In order to enable those skilled in the art to better understand the solutions of the present application, the technical solutions in the embodiments of the present application will be described clearly and completely in conjunction with the accompanying drawings in the embodiments of the present application.
近两年我国大力发展普惠金融,使得互联网金融产业突飞猛进,在实现普惠的同时,也给黑产提供了更为方便快捷低成本的作案手段,给相关互联网金融机构带来不小压力。基于黑名单策略的风控体系建设是第一步,能够通过关联关系有效的防止非冷启动黑产的攻击。在面对冷启动用户的风险识别中,基于用户静态信息(如设备,环境,基于位置的服务(location based services,LBS)信息,应用程序(application software,APP)使用情况等)和动态信息(如用户行为系列)的风控模型起到了关键作用。近几年由于自 然语言处理(natural language processing,NLP)领域研究的飞速发展和成功案例的落地,使得序列模型的应用得到重视,越来越多的金融机构也希望通过对用户行为系列数据建模,来挖掘更多的由于黑名单和静态模型无法捕捉到的黑产用户。In the past two years, China's vigorous development of inclusive finance has enabled the Internet financial industry to advance by leaps and bounds. While achieving inclusiveness, it has also provided the black industry with a more convenient, fast and low-cost means of committing crimes, which has brought considerable pressure to relevant Internet financial institutions. The construction of a risk control system based on the blacklist strategy is the first step, which can effectively prevent non-cold start and black production attacks through association relationships. In the risk identification of cold start users, based on user static information (such as equipment, environment, location-based services (LBS) information, application software (APP) usage, etc.) and dynamic information ( (Such as the user behavior series) of the risk control model played a key role. In recent years, due to the rapid development of research in the field of natural language processing (NLP) and the implementation of successful cases, the application of sequence models has been paid attention to. More and more financial institutions also hope to model user behavior series data , To discover more black users who cannot be captured due to blacklists and static models.
目前的行为系列模型分为两大类:1)基于非线性自回归模型(NARX)行为序列模型,如递归神经网络(RNN)及其变体长短期记忆网络(LSTM)、门控循环单元(GRU)等;2)在NARX的基础上通过引入注意力机制来控制标签对于不同输入的依赖程度。然而,发明人经过研究发现,对于第1)类,基于非线性自回归模型的行为序列模型通常基于encoder-decoder的方式进行建模,数据经由encoder编码成隐状态,后经由decoder解码后通过相应的全连接层和softmax进行标签映射,然而当行为系列越来越长时,仅仅依靠隐状态进行信息传递不能够显性的表征全局信息。对于第2)类,因为NARX类模型对处理长序列的不足,基于注意力机制的模型由于可以感知全局信息而受到更多关注,注意力机制是一类嵌入到神经网络中的用来判断不同输入权重的算法,尽管注意力机制具有全局视野,然而目前基于注意力机制的模型只能单独从时间维度、或特征维度去进行建模,这样就忽略了行为系列在时间-特征交叉维度上的信息。The current behavioral series models are divided into two categories: 1) Behavioral sequence models based on non-linear autoregressive models (NARX), such as recurrent neural networks (RNN) and its variants, long and short-term memory networks (LSTM), gated recurrent units ( GRU), etc.; 2) On the basis of NARX, an attention mechanism is introduced to control the dependence of tags on different inputs. However, the inventor found through research that for category 1), the behavioral sequence model based on the nonlinear autoregressive model is usually modeled based on the encoder-decoder method. The data is encoded into a hidden state by the encoder, and then decoded by the decoder and passed through the corresponding The fully connected layer and softmax are used for label mapping. However, when the behavior series are getting longer and longer, only relying on the hidden state for information transfer cannot explicitly represent the global information. For category 2), because the NARX model is insufficient for processing long sequences, the attention mechanism-based model has received more attention because it can perceive global information. The attention mechanism is a type of neural network that is embedded in the neural network to judge differences. The algorithm for input weights, although the attention mechanism has a global vision, but the current attention mechanism-based models can only be modeled from the time dimension or feature dimension alone, thus ignoring the behavioral series in the time-feature cross dimension. information.
针对上述问题,发明人经过长期的研究发现,并提出了本申请实施例提供的用户数据的危险属性确定方法、装置以及电子设备,通过设计双向注意力机制嵌入到编码-解码结构中用来挖掘用户数据的危险属性,将时间空间的隐状态和特征空间的隐状态整合表征注意力,提升用户数据的危险属性的判定准确性。其中,具体的用户数据的危险属性确定方法在后续的实施例中进行详细的说明。In response to the above problems, the inventor has discovered through long-term research and proposed the method, device, and electronic device for determining the dangerous attributes of user data provided by the embodiments of this application. The two-way attention mechanism is designed to be embedded in the encoding-decoding structure for mining The dangerous attributes of user data integrate the hidden state of time and space and the hidden state of feature space to represent attention, and improve the accuracy of judging the dangerous attributes of user data. Among them, the specific method for determining the dangerous attribute of the user data will be described in detail in the subsequent embodiments.
请参阅图1,图1示出了本申请一个实施例提供的用户数据的危险属性确定方法的流程示意图。所述用户数据的危险数据确定方法用于通过设计双向注意力机制嵌入到编码-解码结构中用来挖掘用户数据的危险属性,将时间空间的隐状态和特征空间的隐状态整合表征注意力,提升用户数据的危险属性的判定准确性。在具体的实施例中,所述用户数据的危险属性确定方法应用于如图8所示的用户数据的危险属性确定装置200以及配置有用户数据的危险属性确定装置200的电子设备100(图9)。下面将以电子设备为例,说明本实施例的具体流程,当然,可以理解的,本实施例所应用的电子设备可以为智能手机、平板电脑、穿戴式电子设备等,在此不做限定。小面将针对图1所示的流程进行详细的阐述,所述用户数据的危险属性确定方法具体可以包括以下步骤:Please refer to FIG. 1. FIG. 1 shows a schematic flowchart of a method for determining a dangerous attribute of user data provided by an embodiment of the present application. The method for determining the dangerous data of user data is used to mine the dangerous attributes of user data by designing a two-way attention mechanism and embedding it into the encoding-decoding structure, and integrate the hidden state of time and space and the hidden state of feature space to represent attention, Improve the accuracy of determining the dangerous attributes of user data. In a specific embodiment, the method for determining the dangerous attribute of user data is applied to the device 200 for determining the dangerous attribute of user data as shown in FIG. 8 and the electronic equipment 100 (FIG. 9 ). The following will take an electronic device as an example to describe the specific process of this embodiment. Of course, it is understandable that the electronic device applied in this embodiment may be a smart phone, a tablet computer, a wearable electronic device, etc., which is not limited here. The facet will elaborate on the process shown in Figure 1. The method for determining the dangerous attributes of the user data may specifically include the following steps:
步骤S101:获取用户数据,所述用户数据包括存在对应关系的时间数据和特征数据。Step S101: Obtain user data, where the user data includes time data and characteristic data that have a corresponding relationship.
在本实施例中,可以获取用户数据,其中,可以实时获取用户数据,可以按预设时间间隔获取用户数据,可以按指定时间获取用户数据,也可以按其他预设规则获取用户数据等,在此不做限定。在一些实施方式中,可以从电子设备的本地获取用户数据(电子设备预先记录并存储用户数据),可以从与电子设备连接的服务器获取用户数据(服务器预先记录并存储用户数据)等,在此不做限定。In this embodiment, user data can be obtained. Among them, user data can be obtained in real time, user data can be obtained at preset time intervals, user data can be obtained at a specified time, or user data can be obtained according to other preset rules. This is not limited. In some embodiments, user data can be obtained locally from the electronic device (the electronic device pre-records and stores user data), user data can be obtained from a server connected to the electronic device (the server pre-records and stores user data), etc. Not limited.
在一些实施方式中,用户数据包括存在对应关系的时间数据和特征数据,其中,时间数据可以以月为时间周期、可以以周为时间周期、可以以日为时间周期、也可以以小时为时间 周期等,例如,当时间数据以月为时间周期时,则用户数据可以包括在xx月内的特征数据;当时间数据以周为时间周期时,则用户数据可以包括在xx周内的特征数据;当时间数据以日为时间周期时,则用户数据可以包括在xx日内的特征数据;当用户数据以小时为时间周期时,则用户数据可以包括在xx时间段内的特征数据等,在此不做限定。In some embodiments, the user data includes time data and characteristic data that have a corresponding relationship, where the time data can use months as the time period, weeks as the time period, days as the time period, or hours as the time. Period, etc., for example, when the time data takes months as the time period, the user data can include the characteristic data in xx months; when the time data takes the week as the time period, the user data can include the characteristic data in xx weeks ; When the time data takes the day as the time period, the user data can include the characteristic data in xx days; when the user data takes the hour as the time period, the user data can include the characteristic data in the xx time period, etc., here Not limited.
在一些实施方式中,特征数据可以包括属性数据、行为数据等。其中,属性数据可以包括但不限于:年龄数据、性别数据、地理位置数据、爱好数据。其中,行为数据可以包括但不限于:登录数据、浏览数据、点击数据、跳转数据、支付数据、评价数据。于本实施例中,获取的用户数据可以包括:用户在在xx时间段内的年龄数据、性别数据、地理位置数据、爱好数据、登录数据、浏览数据、点击数据、跳转数据、支付数据、评价数据;用户在xx月内的年龄数据、性别数据、地理位置数据、爱好数据、登录数据、浏览数据、点击数据、跳转数据、支付数据、评价数据等,在此不做限定。In some embodiments, the characteristic data may include attribute data, behavior data, and the like. Among them, the attribute data may include, but is not limited to: age data, gender data, geographic location data, and hobby data. Among them, the behavior data may include, but is not limited to: login data, browsing data, click data, jump data, payment data, and evaluation data. In this embodiment, the acquired user data may include: the user’s age data, gender data, geographic location data, hobby data, login data, browsing data, click data, jump data, payment data, Evaluation data; the user’s age data, gender data, geographic location data, hobby data, login data, browsing data, click data, jump data, payment data, evaluation data, etc. within xx months are not limited here.
步骤S102:对所述用户数据进行编码,获得所述用户数据的编码数据,所述编码数据包括时间空间隐状态和特征空间隐状态。Step S102: Encode the user data to obtain encoded data of the user data, where the encoded data includes a time-space hidden state and a feature-space hidden state.
在本实施例中,在获取用户数据后,可以对用户数据进行编码(Encoder),获得该用户数据的编码数据,其中,获得的编码数据可以包括时间空间隐状态和特征空间隐状态。请参阅图2,图2示出了本申请实施例提供的用户数据的编码-解码的示意图,如图2所示,在一些实施方式中,对用户数据进行Encoder,Encoder过程中输出的编码数据是RNN隐状态
Figure PCTCN2020086194-appb-000001
其中,T表示序列长度,M表示隐状态的长度,
Figure PCTCN2020086194-appb-000002
标识以序列长度为T,隐状态的长度为M的编码数据隐状态,其中,
Figure PCTCN2020086194-appb-000003
表示全部通道在t th时刻的隐状态,即特征空间隐状态,
Figure PCTCN2020086194-appb-000004
表示第m th个通道在全部时间点上的隐状态,即时间空间隐状态,如图2中的A所示。
In this embodiment, after acquiring user data, the user data may be encoded (Encoder) to obtain the encoded data of the user data, where the acquired encoded data may include temporal and spatial hidden states and feature space hidden states. Please refer to FIG. 2. FIG. 2 shows a schematic diagram of encoding-decoding of user data provided by an embodiment of the present application. As shown in FIG. 2, in some embodiments, the user data is Encoder, and the encoded data output during the Encoder process Is the hidden state of RNN
Figure PCTCN2020086194-appb-000001
Among them, T represents the length of the sequence, M represents the length of the hidden state,
Figure PCTCN2020086194-appb-000002
Identify the hidden state of encoded data with sequence length T and hidden state length M, where,
Figure PCTCN2020086194-appb-000003
Indicates the hidden state of all channels at time t th , that is, the hidden state of the feature space,
Figure PCTCN2020086194-appb-000004
Indicates the hidden state of the m th channel at all time points, that is, the hidden state of time and space, as shown in A in Figure 2.
步骤S103:基于双向注意力机制,对所述时间空间隐状态和所述特征空间隐状态进行计算,获得双向注意力矩阵。Step S103: Based on the two-way attention mechanism, calculate the time-space hidden state and the feature space hidden state to obtain a two-way attention matrix.
在本实施例中,在获得时间空间隐状态和特征空间隐状态后,可以基于双向注意力机制,对时间空间隐状态和特征空间隐状态进行计算,获得双向注意力矩阵。在一些实施方式中,在获得时间空间隐状态和特征空间隐状态后,可以基于双向注意力机制,对时间空间隐状态进行第一加权计算,并对特征空间隐状态进行第二加权计算,获得双向注意力矩阵。在一些实施方式中,在获得时间空间隐状态和特征空间隐状态后,可以基于双向注意力机制对时间空间隐状态和特征空间隐状态进行加权计算,并通过相应的全连接层和softmax进行标签映射,获得双向注意力矩阵。In this embodiment, after the time-space hidden state and the feature-space hidden state are obtained, the time-space hidden state and the feature-space hidden state can be calculated based on the two-way attention mechanism to obtain a two-way attention matrix. In some embodiments, after obtaining the hidden state of time and space and the hidden state of feature space, based on the two-way attention mechanism, the first weighted calculation is performed on the hidden state of time and space, and the second weighted calculation is performed on the hidden state of feature space to obtain Two-way attention matrix. In some embodiments, after obtaining the time-space hidden state and the feature-space hidden state, the time-space hidden state and the feature-space hidden state can be weighted based on the two-way attention mechanism, and the corresponding fully connected layer and softmax can be used for labeling. Mapping to obtain a two-way attention matrix.
步骤S104:基于所述双向注意力矩阵和所述编码数据,生成待解码数据。Step S104: Generate data to be decoded based on the two-way attention matrix and the encoded data.
在本实施例中,在获得双向注意力矩阵和编码数据后,可以基于双向注意力矩阵和编码数据,生成待解码数据。在一些实施方式中,在获得双向注意力矩阵和编码数据后,可以对双向注意力矩阵和编码数据进行计算,获得待解码数据。In this embodiment, after obtaining the bidirectional attention matrix and the coded data, the data to be decoded can be generated based on the bidirectional attention matrix and the coded data. In some embodiments, after obtaining the bidirectional attention matrix and the encoded data, the bidirectional attention matrix and the encoded data can be calculated to obtain the data to be decoded.
步骤S105:对所述待解码数据进行解码,获得所述用户数据的解码数据,并基于所 述解码数据确定所述用户数据的危险属性。Step S105: Decode the data to be decoded, obtain decoded data of the user data, and determine the dangerous attribute of the user data based on the decoded data.
在本实施例中,在生成待解码数据后,可以对待解码数据进行解码(Decoder),获得用户数据的解码数据,并基于该解码数据确定用户数据的危险属性。其中,由于双向注意力机制融合了时间空间和特征空间信息,能够将注意力机制的全局视野进行维度延伸,从而更准确的从同一时刻的不同特征和不同时刻的同一特征系列层面同时映射标签信息得到解码数据,使得基于解码数据确定的用户数据的危险属性更准确。In this embodiment, after the data to be decoded is generated, the data to be decoded can be decoded (Decoder) to obtain the decoded data of the user data, and the dangerous attributes of the user data can be determined based on the decoded data. Among them, because the two-way attention mechanism integrates time-space and feature-space information, it can extend the dimensionality of the attention mechanism's global vision, thereby more accurately mapping label information from different features at the same time and the same feature series at different times. Obtaining the decoded data makes the risk attributes of the user data determined based on the decoded data more accurate.
在一些实施方式中,基于解码数据确定用户数据的危险属性可以为基于解码数据确定用户数据为危险,或者基于解码数据确定用户数据为不危险。在一些实施方式中,基于解码数据确定用户数据的危险属性可以为基于解码数据确定用户数据的危险等级,例如,基于解码数据确定用户数据的危险等级为高、基于解码数据确定用户数据的危险等级为中等偏高、基于解码数据确定用户数据的危险等级为中等、基于解码数据确定用户数据的危险等级为中等偏低、基于解码数据确定用户数据的危险等级为低等,在此不做限定。In some embodiments, determining the risk attribute of the user data based on the decoded data may be determining that the user data is dangerous based on the decoded data, or determining that the user data is not dangerous based on the decoded data. In some embodiments, determining the risk attribute of the user data based on the decoded data may be determining the risk level of the user data based on the decoded data, for example, determining that the risk level of the user data is high based on the decoded data, and determining the risk level of the user data based on the decoded data It is medium to high, the risk level of user data is determined to be medium based on decoded data, the risk level of user data is determined to be medium to low based on decoded data, and the risk level of user data is determined to be low based on decoded data, etc., which are not limited here.
本申请一个实施例提供的用户数据的危险属性确定方法,获取用户数据,用户数据包括存在对应关系的时间数据和特征数据,对用户数据进行编码,获得用户数据的编码数据,该编码数据包括时间空间隐状态和特征空间隐状态,基于双向注意力机制,对时间空间隐状态和特征空间隐状态进行计算,获得双向注意力矩阵,基于双向注意力矩阵和编码数据,生成待解码数据,对待解码数据进行解码,获得用户数据的解码数据,并基于解码数据确定用户数据的危险属性,从而通过设计双向注意力机制嵌入到编码-解码结构中用来挖掘用户数据的危险属性,将时间空间的隐状态和特征空间的隐状态整合表征注意力,提升用户数据的危险属性的判定准确性。The method for determining the dangerous attributes of user data provided in an embodiment of the present application obtains user data. The user data includes time data and characteristic data that have a corresponding relationship. The user data is encoded to obtain the encoded data of the user data. The encoded data includes time. Spatial hidden state and feature space hidden state, based on the two-way attention mechanism, calculate the time-space hidden state and feature space hidden state to obtain a two-way attention matrix, based on the two-way attention matrix and encoded data, generate data to be decoded, and to be decoded The data is decoded to obtain the decoded data of the user data, and the dangerous attributes of the user data are determined based on the decoded data. The two-way attention mechanism is designed to be embedded in the encoding-decoding structure to mine the dangerous attributes of the user data and hide the time and space. The hidden state of state and feature space integrates and represents attention, which improves the accuracy of judging the dangerous attributes of user data.
请参阅图3,图3示出了本申请又一个实施例提供的用户数据的危险属性确定方法的流程示意图。下面将针对图3所示的流程进行详细的阐述,所述用户数据的危险属性确定方法具体可以包括以下步骤:Please refer to FIG. 3, which shows a schematic flowchart of a method for determining a dangerous attribute of user data provided by another embodiment of the present application. The following will elaborate on the process shown in FIG. 3, and the method for determining the dangerous attributes of the user data may specifically include the following steps:
步骤S201:获取用户数据,所述用户数据包括存在对应关系的时间数据和特征数据。Step S201: Obtain user data, where the user data includes time data and characteristic data that have a corresponding relationship.
步骤S202:对所述用户数据进行编码,获得所述用户数据的编码数据,所述编码数据包括时间空间隐状态和特征空间隐状态。Step S202: Encode the user data to obtain encoded data of the user data, where the encoded data includes a time-space hidden state and a feature-space hidden state.
其中,步骤S201-步骤S202的具体描述请参阅步骤S101-步骤S102,在此不再赘述。For the specific description of step S201 to step S202, please refer to step S101 to step S102, which will not be repeated here.
步骤S203:基于双向注意力机制,对所述时间空间隐状态进行计算,获得第一全连接层。Step S203: Based on the two-way attention mechanism, calculate the temporal and spatial hidden state to obtain the first fully connected layer.
在本实施例中,在获得时间空间隐状态后,可以基于双向注意力机制,对时间空间隐状态进行计算,获得第一全连接层,如图2中的B所示。In this embodiment, after the time and space hidden state is obtained, the time and space hidden state can be calculated based on the two-way attention mechanism to obtain the first fully connected layer, as shown in B in FIG. 2.
请参阅图4,图4示出了本申请的图3所示的用户数据的危险属性确定方法的步骤S203的流程示意图。下面将针对图4所示的流程进行详细的阐述,所述方法具体可以包括以下步骤:Please refer to FIG. 4, which shows a schematic flowchart of step S203 of the method for determining the dangerous attribute of user data shown in FIG. 3 of the present application. The following will elaborate on the process shown in FIG. 4, and the method may specifically include the following steps:
步骤S2031:获取第一权重系数矩阵。Step S2031: Obtain the first weight coefficient matrix.
在本实施例中,在获得时间空间隐状态后,可以基于双向注意力机制,获得第一权重系数矩阵。其中,该第一权重系数矩阵可以在训练过程中学习得到。在一些实施方式中,该第一权重系数矩阵可以在训练过程中得到后保存在电子设备的本地,并在获得时间空间隐状态后,直接从电子设备的本地获取该第一权重系数矩阵。在另一种实施方式中,该第一权重系数矩阵可以在训练过程中得到后保存在于电子设备通信连接的服务器,并在获得时间空间隐状态后,通过无线网络或数据网络从服务器获取该第一权重系数矩阵。In this embodiment, after obtaining the temporal and spatial hidden state, the first weight coefficient matrix can be obtained based on the two-way attention mechanism. Among them, the first weight coefficient matrix can be learned during the training process. In some embodiments, the first weight coefficient matrix may be obtained in the training process and then stored locally in the electronic device, and after obtaining the temporal and spatial hidden state, the first weight coefficient matrix may be directly obtained locally from the electronic device. In another embodiment, the first weight coefficient matrix may be obtained during the training process and stored in a server connected to the electronic device in communication, and after obtaining the temporal and spatial hidden state, the first weight coefficient matrix may be obtained from the server through a wireless network or a data network. A matrix of weight coefficients.
步骤S2032:对所述第一权重系数矩阵和所述时间空间隐状态进行计算,获得第一全连接层。Step S2032: Calculate the first weight coefficient matrix and the temporal and spatial hidden state to obtain a first fully connected layer.
在本实施例中,在获取第一权重系数矩阵后,可以对第一权重系数矩阵和时间空间隐状态进行计算,获得第一全连接层。在一些实施方式中,可以基于
Figure PCTCN2020086194-appb-000005
对第一权重系数矩阵和时间空间隐状态进行计算,获得第一全连接层α t,其中,W α为第一权重系数矩阵,
Figure PCTCN2020086194-appb-000006
为时间空间隐状态。在一些实施方式中,第一权重系数矩阵为
Figure PCTCN2020086194-appb-000007
In this embodiment, after obtaining the first weight coefficient matrix, the first weight coefficient matrix and the temporal and spatial hidden state can be calculated to obtain the first fully connected layer. In some embodiments, it can be based on
Figure PCTCN2020086194-appb-000005
Calculate the first weight coefficient matrix and the time-space hidden state to obtain the first fully connected layer α t , where W α is the first weight coefficient matrix,
Figure PCTCN2020086194-appb-000006
It is the hidden state of time and space. In some embodiments, the first weight coefficient matrix is
Figure PCTCN2020086194-appb-000007
步骤S204:基于双向注意力机制,对所述特征空间隐状态进行计算,获得第二全连接层。Step S204: Based on the two-way attention mechanism, calculate the hidden state of the feature space to obtain a second fully connected layer.
在本实施例中,在获得特征空间隐状态后,可以基于双向注意力机制,对特征空间隐状态进行计算,获得第二全连接层,如图2中的C所示。In this embodiment, after obtaining the hidden state of the feature space, the hidden state of the feature space can be calculated based on the bidirectional attention mechanism to obtain the second fully connected layer, as shown in C in FIG. 2.
请参阅图5,图5示出了本申请的图3所示的用户数据的危险属性确定方法的步骤S204的流程示意图。下面将针对图5所示的流程进行详细的阐述,所述方法具体可以包括以下步骤:Please refer to FIG. 5, which shows a schematic flowchart of step S204 of the method for determining the dangerous attribute of user data shown in FIG. 3 of the present application. The following will elaborate on the process shown in FIG. 5, and the method may specifically include the following steps:
步骤S2041:获取第二权重系数矩阵。Step S2041: Obtain a second weight coefficient matrix.
在本实施例中,在获得特征空间隐状态后,可以基于双向注意力机制,获得第二权重系数矩阵。其中,该第二权重系数矩阵可以在训练过程中学习得到。在一些实施方式中,该第二权重系数矩阵可以在训练过程中得到后保存在电子设备的本地,并在获得特征空间隐状态后,直接从电子设备的本地获取该第二权重系数矩阵。在另一种实施方式中,该第二权重系数矩阵可以在训练过程中得到后保存在于电子设备通信连接的服务器,并在获得特征空间隐状态后,通过无线网络或数据网络从服务器获取该第二权重系数矩阵。In this embodiment, after obtaining the hidden state of the feature space, the second weight coefficient matrix can be obtained based on the two-way attention mechanism. Wherein, the second weight coefficient matrix can be learned during the training process. In some embodiments, the second weighting coefficient matrix may be obtained in the training process and then stored locally in the electronic device, and after obtaining the hidden state of the feature space, the second weighting coefficient matrix may be directly obtained locally from the electronic device. In another embodiment, the second weight coefficient matrix may be obtained during the training process and then stored in a server that is communicatively connected to the electronic device, and after obtaining the hidden state of the feature space, the second weight coefficient matrix may be obtained from the server through a wireless network or a data network. Two-weight coefficient matrix.
步骤S2042:对所述第二权重系数矩阵和所述特征空间隐状态进行计算,获得第二全连接层。Step S2042: Calculate the second weight coefficient matrix and the hidden state of the feature space to obtain a second fully connected layer.
在本实施例中,在获取第二权重系数矩阵后,可以对第二权重系数矩阵和特征空间隐状态进行计算,获得第二全连接层。在一些实施方式中,可以基于β m=W βh m对第二权重系数矩阵和特征空间隐状态进行计算,获得第二全连接层β m,其中,W β为第二权重系数矩阵,h m为特征空间隐状态。在一些实施方式中,第二权重系数矩阵为
Figure PCTCN2020086194-appb-000008
In this embodiment, after the second weight coefficient matrix is obtained, the second weight coefficient matrix and the hidden state of the feature space can be calculated to obtain the second fully connected layer. In some embodiments, the second weight coefficient matrix and the hidden state of the feature space may be calculated based on β m =W β h m to obtain the second fully connected layer β m , where W β is the second weight coefficient matrix, h m is the hidden state of the feature space. In some embodiments, the second weight coefficient matrix is
Figure PCTCN2020086194-appb-000008
步骤S205:对所述第一全连接层和所述第二全连接层进行计算,获得所述双向注意力矩阵。Step S205: Perform calculations on the first fully connected layer and the second fully connected layer to obtain the two-way attention matrix.
在本实施例中,在获得第一全连接层和第二全连接层后,可以对第一全连接层和第二全 连接层进行计算,获得双向注意力矩阵,如图2中的D所示。In this embodiment, after obtaining the first fully connected layer and the second fully connected layer, the first fully connected layer and the second fully connected layer can be calculated to obtain the two-way attention matrix, as shown in D in Figure 2 Show.
请参阅图6,图6示出了本申请的图3所示的用户数据的危险属性确定方法的步骤S205的流程示意图。下面将针对图6所示的流程进行详细的阐述,所述方法具体可以包括以下步骤:Please refer to FIG. 6. FIG. 6 shows a schematic flowchart of step S205 of the method for determining the dangerous attribute of user data shown in FIG. 3 of the present application. The process shown in FIG. 6 will be described in detail below, and the method may specifically include the following steps:
步骤S2051:获取权重系数向量。Step S2051: Obtain a weight coefficient vector.
在本实施例中,在获得第一全连接层和第二全连接层后,可以基于双向注意力机制,获得权重系数向量。其中,该权重系数向量可以在训练过程中学习得到。在一些实施方式中,该权重系数向量可以在训练过程中得到后保存在电子设备的本地,并在获得第一全连接层和第二全连接层后,直接从电子设备的本地获取该权重系数向量。在另一种实施方式中,该权重系数向量可以在训练过程中得到后保存在于电子设备通信连接的服务器,并在获得第一全连接层和第二全连接层后,通过无线网络或数据网络从服务器获取该权重系数向量。In this embodiment, after obtaining the first fully connected layer and the second fully connected layer, the weight coefficient vector can be obtained based on the two-way attention mechanism. Among them, the weight coefficient vector can be learned during the training process. In some embodiments, the weight coefficient vector may be obtained in the training process and then stored locally in the electronic device, and after obtaining the first fully connected layer and the second fully connected layer, the weight coefficient can be obtained directly from the electronic device. vector. In another embodiment, the weight coefficient vector can be obtained in the training process and then stored in the server connected to the electronic device communication, and after obtaining the first fully connected layer and the second fully connected layer, it can be passed through a wireless network or a data network. Obtain the weight coefficient vector from the server.
步骤S2052:对所述权重系数向量、所述第一全连接层以及所述第二全连接层进行计算,获得所述双向注意力矩阵。Step S2052: Calculate the weight coefficient vector, the first fully connected layer, and the second fully connected layer to obtain the bidirectional attention matrix.
在本实施例中,在获得权重系数向量后,可以对权重系数向量、第一全连接层以及第二全连接层进行计算,获得双向注意力矩阵。在一些实施方式中,可以基于r t m=W rtanh(α tm)对权重系数向量、第一全连接层以及第二全连接层进行计算,获得双向注意力矩阵r t m,其中,W r为权重系数向量,α t为第一全连接层,β m为第二全连接层。在一些实施方式中,权重系数向量为
Figure PCTCN2020086194-appb-000009
In this embodiment, after the weight coefficient vector is obtained, the weight coefficient vector, the first fully connected layer, and the second fully connected layer can be calculated to obtain the bidirectional attention matrix. In some embodiments, the weight coefficient vector, the first fully connected layer, and the second fully connected layer may be calculated based on r t m =W r tanh(α tm ) to obtain the bidirectional attention matrix r t m , Among them, W r is the weight coefficient vector, α t is the first fully connected layer, and β m is the second fully connected layer. In some embodiments, the weight coefficient vector is
Figure PCTCN2020086194-appb-000009
其中,在本实施例中,正式由于双向注意力矩阵r t m同时整合了第一全连接层α t和第二全连接层β m,因此,双向注意力矩阵r t m具备了时间空间和特征空间的分布信息,即双向注意力矩阵r t m所能够反映的信息更准确性。 Among them, in this embodiment, since the two-way attention matrix r t m integrates the first fully connected layer α t and the second fully connected layer β m at the same time, the two-way attention matrix r t m has both time, space, and time. The distribution information of the feature space, that is, the information reflected by the bidirectional attention matrix r t m is more accurate.
步骤S206:基于softmax函数对所述双向注意力矩阵进行处理,获得概率矩阵。Step S206: Process the bidirectional attention matrix based on the softmax function to obtain a probability matrix.
在本实施例中,在获得双向注意力矩阵后,可以基于softmax函数对双向注意力矩阵进行处理,获得概率矩阵,具体地,为了确保所有的注意力权重在同一个通道内的总和为1,则可以通过softmax函数对双向注意力矩阵进行处理,获得概率矩阵。在一些实施方式中,可以基于
Figure PCTCN2020086194-appb-000010
对双向注意力矩阵进行计算,获得概率矩阵
Figure PCTCN2020086194-appb-000011
其中,r t m为双向注意力矩阵。
In this embodiment, after obtaining the bidirectional attention matrix, the bidirectional attention matrix can be processed based on the softmax function to obtain the probability matrix. Specifically, in order to ensure that the sum of all attention weights in the same channel is 1, Then the two-way attention matrix can be processed by the softmax function to obtain the probability matrix. In some embodiments, it can be based on
Figure PCTCN2020086194-appb-000010
Calculate the bidirectional attention matrix to obtain the probability matrix
Figure PCTCN2020086194-appb-000011
Among them, r t m is a two-way attention matrix.
步骤S207:基于所述概率矩阵和所述编码数据,生成所述待解码数据。Step S207: Generate the data to be decoded based on the probability matrix and the encoded data.
在一些实施方式中,在获得概率矩阵和编码数据后,可以基于
Figure PCTCN2020086194-appb-000012
对概率矩阵和编码数据进行计算,获得待解码数据
Figure PCTCN2020086194-appb-000013
其中,
Figure PCTCN2020086194-appb-000014
为概率数据,
Figure PCTCN2020086194-appb-000015
为编码数据。
In some embodiments, after obtaining the probability matrix and the encoded data, it can be based on
Figure PCTCN2020086194-appb-000012
Calculate the probability matrix and encoded data to obtain the data to be decoded
Figure PCTCN2020086194-appb-000013
in,
Figure PCTCN2020086194-appb-000014
Is probabilistic data,
Figure PCTCN2020086194-appb-000015
Is the encoded data.
步骤S208:对所述待解码数据进行解码,获得所述用户数据的解码数据,并基于所述解码数据确定所述用户数据的危险属性。Step S208: Decode the data to be decoded, obtain decoded data of the user data, and determine the dangerous attribute of the user data based on the decoded data.
其中,步骤S208的具体描述请参阅步骤S105,在此不再赘述。For the specific description of step S208, please refer to step S105, which will not be repeated here.
本申请又一个实施例提供的用户数据的危险属性确定方法,获取用户数据,用户数据包括存在对应关系的时间数据和特征数据,对用户数据进行编码,获得用户数据的编码数据,编码数据包括时间空间隐状态和特征空间隐状态,基于双向注意力机制,对时间空间隐状态进行计算,获得第一全连接层,基于双向注意力机制,对特征空间隐状态进行计算,获得第二全连接层,对第一全连接层和第二全连接层进行计算,获得双向注意力矩阵,基于softmax函数对双向注意力矩阵进行处理,获得概率矩阵,基于概率矩阵和编码数据,生成待解码数据,对待解码数据进行解码,获得用户数据的解码数据,并基于解码数据确定用户数据的危险属性。相较于图1所示的用户数据的危险属性确定方法,本实施例还对时间空间隐状态和特征空间隐状态分别进行计算,获得两个不同的全连接层,并基于两个不同的全连接层得到双向注意力矩阵,以提升用户数据的危险属性的判定准确性。According to another embodiment of the present application, a method for determining a dangerous attribute of user data is obtained. The user data includes time data and characteristic data that have a corresponding relationship. The user data is encoded to obtain the encoded data of the user data. The encoded data includes time. Space hidden state and feature space hidden state, based on the two-way attention mechanism, calculate the hidden state of time and space, obtain the first fully connected layer, based on the two-way attention mechanism, calculate the hidden state of feature space, obtain the second fully connected layer , Calculate the first fully connected layer and the second fully connected layer to obtain a two-way attention matrix, process the two-way attention matrix based on the softmax function to obtain a probability matrix, and generate the data to be decoded based on the probability matrix and the encoded data. The decoded data is decoded to obtain the decoded data of the user data, and the dangerous attributes of the user data are determined based on the decoded data. Compared with the method for determining the dangerous attributes of user data shown in FIG. 1, this embodiment also calculates the hidden state of time and space and the hidden state of feature space respectively to obtain two different fully connected layers based on two different fully connected layers. The connection layer obtains a two-way attention matrix to improve the accuracy of judging the dangerous attributes of the user data.
请参阅图7,图7示出了本申请再一个实施例提供的用户数据的危险属性确定方法的流程示意图。下面将针对图7所示的流程进行详细的阐述,所述用户数据的危险属性确定方法具体可以包括以下步骤:Please refer to FIG. 7, which shows a schematic flowchart of a method for determining a dangerous attribute of user data provided by another embodiment of the present application. The process shown in FIG. 7 will be described in detail below. The method for determining the dangerous attributes of the user data may specifically include the following steps:
步骤S301:获取用户数据,所述用户数据包括存在对应关系的时间数据和特征数据。Step S301: Obtain user data, where the user data includes time data and characteristic data that have a corresponding relationship.
步骤S302:对所述用户数据进行编码,获得所述用户数据的编码数据,所述编码数据包括时间空间隐状态和特征空间隐状态。Step S302: Encode the user data to obtain encoded data of the user data, where the encoded data includes a time-space hidden state and a feature-space hidden state.
步骤S303:基于双向注意力机制,对所述时间空间隐状态和所述特征空间隐状态进行计算,获得双向注意力矩阵。Step S303: Based on the two-way attention mechanism, calculate the time-space hidden state and the feature space hidden state to obtain a two-way attention matrix.
步骤S304:基于所述双向注意力矩阵和所述编码数据,生成待解码数据。Step S304: Generate data to be decoded based on the two-way attention matrix and the encoded data.
步骤S305:对所述待解码数据进行解码,获得所述用户数据的解码数据。Step S305: Decode the data to be decoded to obtain decoded data of the user data.
其中,步骤S301-步骤S305的具体描述请参阅步骤S101-步骤S105,在此不再赘述。For the specific description of step S301 to step S305, please refer to step S101 to step S105, which will not be repeated here.
步骤S306:当所述解码数据为第一数据时,确定所述用户数据的危险属性为危险。Step S306: When the decoded data is the first data, it is determined that the dangerous attribute of the user data is dangerous.
在一些实施方式中,可以预先设置第一数据和第二数据,其中,该第一数据可以用于表征该解码数据对应用户数据的危险属性为危险,该第二数据可以用于表征该界面数据对应的用户数据的危险属性为不危险,例如,该第一数据可以为“1”,第二数据可以为“0”。In some embodiments, the first data and the second data may be set in advance, where the first data may be used to characterize the risk attribute of the user data corresponding to the decoded data as dangerous, and the second data may be used to characterize the interface data The dangerous attribute of the corresponding user data is not dangerous. For example, the first data may be "1" and the second data may be "0".
在一些实施方式中,在获得解码数据后,可以将解码数据分别与第一数据和第二数据进行比较,以确定该解码数据为第一数据还是为第二数据。其中,当比较结果表征该解码数据为第一数据,例如,当确定该解码数据为“1”时,可以确定该解码数据对应的用户数据的用户属性为危险。In some embodiments, after the decoded data is obtained, the decoded data can be compared with the first data and the second data, respectively, to determine whether the decoded data is the first data or the second data. Wherein, when the comparison result characterizes that the decoded data is the first data, for example, when it is determined that the decoded data is "1", it can be determined that the user attribute of the user data corresponding to the decoded data is dangerous.
步骤S307:当接收到所述用户数据对应的信息请求时,拒绝所述信息请求。Step S307: When the information request corresponding to the user data is received, the information request is rejected.
在一些实施方式中,在确定该用户数据的属性信息为危险时,表征该用户执行的操作为危险操作或者该用户的行为为危险行为,则在接收到该用户数据对应的信息请求时,拒绝该信息请求,以避免危险操作或者危险行为的发生。In some embodiments, when it is determined that the attribute information of the user data is dangerous, it characterizes that the operation performed by the user is a dangerous operation or the user's behavior is a dangerous behavior, and then when the information request corresponding to the user data is received, refuse This information is requested to avoid dangerous operations or dangerous behaviors.
步骤S308:发出告警提示信息,并将所述用户数据添加至黑名单。Step S308: Send an alarm prompt message, and add the user data to the blacklist.
在一些实施方式中,在确定该用户数据的属性信息为危险时,表征该用户执行的操作为 危险操作或者该用户的行为为危险行为,则可以发出告警提示信息,以提示针对该用户数据进行相应的防御操作。其中,该告警提示信息可以包括语音告警提示信息、文本告警提示信息、图片告警提示信息等另外,该告警提示信息可以直接在电子设备输出,也可以通过电子设备将告警信息发送至服务器输出,在此不做限定。In some embodiments, when it is determined that the attribute information of the user data is dangerous, it characterizes that the operation performed by the user is a dangerous operation or the behavior of the user is a dangerous behavior, and then an alarm prompt message may be issued to prompt the user to perform actions on the user data. Corresponding defensive operations. Among them, the alarm prompt information can include voice alarm prompt information, text alarm prompt information, picture alarm prompt information, etc. In addition, the alarm prompt information can be directly output on the electronic device, or the alarm information can be sent to the server for output through the electronic device. This is not limited.
在一些实施方式中,在确定该用户数据的属性信息为危险时,表征该用户执行的操作为危险操作或者该用户的行为为危险行为,则可以将该用户数据添加至黑名单,以直接拒绝该用户数据的任何操作,避免危险操作或者危险行为的发生。在一些实施方式中,在确定该用户数据的属性信息为危险时,可以基于该用户数据的历史信息获取该用户数据的属性信息为危险的次数,并在该用户数据的属性信息为危险的次数达到指定次数(如3次)时,将该用户数据添加至黑名单,在该用户数据的属性信息为危险的此时没有达到指定次数时,发出告警提示信息。In some implementations, when it is determined that the attribute information of the user data is dangerous, it characterizes that the operation performed by the user is a dangerous operation or the behavior of the user is a dangerous behavior, the user data can be added to the blacklist to directly reject Any operation of the user data to avoid dangerous operations or dangerous behaviors. In some embodiments, when it is determined that the attribute information of the user data is dangerous, the number of times the attribute information of the user data is dangerous can be obtained based on the historical information of the user data, and the attribute information of the user data is the number of times dangerous. When the specified number of times (such as 3 times) is reached, the user data is added to the blacklist, and when the attribute information of the user data is dangerous and the specified number of times is not reached, an alarm message is issued.
步骤S309:当所述解码数据为第二数据时,确定所述用户数据的危险属性为不危险。Step S309: When the decoded data is the second data, it is determined that the dangerous attribute of the user data is not dangerous.
在一些实施方式中,在获得解码数据后,可以将解码数据分别与第一数据和第二数据进行比较,以确定该解码数据为第一数据还是为第二数据。其中,当比较结果表征该解码数据为第二数据,例如,当确定该解码数据为“0”时,可以确定该解码数据对应的用户数据的用户属性为不危险。In some embodiments, after the decoded data is obtained, the decoded data can be compared with the first data and the second data, respectively, to determine whether the decoded data is the first data or the second data. Wherein, when the comparison result indicates that the decoded data is the second data, for example, when it is determined that the decoded data is "0", it can be determined that the user attribute of the user data corresponding to the decoded data is not dangerous.
步骤S310:当接收到所述用户数据对应的信息请求时,响应所述信息请求。Step S310: When receiving the information request corresponding to the user data, respond to the information request.
在一些实施方式中,在确定该用户数据的属性信息为不危险时,表征该用户执行的操作为不危险操作或者该用户的行为为不危险行为,则在接收到该用户数据对应的信息请求时,响应该信息请求,以正常响应用户请求,满足用户的需求。In some embodiments, when it is determined that the attribute information of the user data is not dangerous, it is characterized that the operation performed by the user is not dangerous or the behavior of the user is not dangerous, then the information request corresponding to the user data is received At the time, respond to the information request to respond to the user's request normally to meet the user's needs.
本申请再一个实施例提供的用户数据的危险属性确定方法,获取用户数据,用户数据包括存在对应关系的时间数据和特征数据,对用户数据进行编码,获得用户数据的编码数据,该编码数据包括时间空间隐状态和特征空间隐状态,基于双向注意力机制,对时间空间隐状态和特征空间隐状态进行计算,获得双向注意力矩阵,基于双向注意力矩阵和编码数据,生成待解码数据,对待解码数据进行解码,获得用户数据的解码数据,当解码数据为第一数据时,确定用户数据的危险属性为危险,当接收到用户数据对应的信息请求时,拒绝信息请求,发出告警提示,并将用户数据添加至黑名单,当解码数据为第二数据时,确定用户数据为危险属性为不危险,当解码数据为第二数据时,响应信息请求。相较于图1所示的用户数据的危险属性确定方法,本实施例还在确定用户数据的危险属性为危险时拒绝该用户数据对应的信息请求,并在用户数据的危险数据为不危险时响应该用户数据对应的信息请求,以提升用户数据的危险属性的判定准确性。According to another embodiment of the present application, a method for determining a dangerous attribute of user data is obtained. The user data includes time data and characteristic data that have a corresponding relationship. The user data is encoded to obtain the encoded data of the user data. The encoded data includes Time and space hidden state and feature space hidden state, based on the two-way attention mechanism, calculate the time and space hidden state and feature space hidden state to obtain a two-way attention matrix, based on the two-way attention matrix and encoded data, generate the data to be decoded, and treat The decoded data is decoded to obtain the decoded data of the user data. When the decoded data is the first data, the dangerous attribute of the user data is determined to be dangerous. When the information request corresponding to the user data is received, the information request is rejected, an alarm is issued, and The user data is added to the blacklist, and when the decoded data is the second data, it is determined that the user data has a dangerous attribute as not dangerous, and when the decoded data is the second data, the information request is responded to. Compared with the method for determining the dangerous attribute of user data shown in FIG. 1, this embodiment also rejects the information request corresponding to the user data when the dangerous attribute of the user data is determined to be dangerous, and when the dangerous data of the user data is not dangerous Respond to the information request corresponding to the user data to improve the accuracy of determining the dangerous attributes of the user data.
请参阅图8,图8示出了本申请实施例提供的用户数据的危险属性确定装置200的模块框图。下面将针对图8所示的框图进行阐述,所述用户数据的危险属性确定装置200包括:用户数据获取模块210、编码数据获得模块220、双向注意力矩阵获得模块230、待解码数据生成模块240以及危险属性确定模块250,其中:Please refer to FIG. 8. FIG. 8 shows a block diagram of a device 200 for determining a dangerous attribute of user data provided by an embodiment of the present application. The following will elaborate on the block diagram shown in FIG. 8, the device 200 for determining the dangerous attributes of user data includes: a user data acquisition module 210, an encoded data acquisition module 220, a bidirectional attention matrix acquisition module 230, and a to-be-decoded data generation module 240 And the dangerous attribute determination module 250, in which:
用户数据获取模块210,用于获取用户数据,所述用户数据包括存在对应关系的时间数 据和特征数据。The user data acquisition module 210 is configured to acquire user data, and the user data includes time data and characteristic data that have a corresponding relationship.
编码数据获得模块220,用于对所述用户数据进行编码,获得所述用户数据的编码数据,所述编码数据包括时间空间隐状态和特征空间隐状态。The coded data obtaining module 220 is configured to code the user data to obtain coded data of the user data, and the coded data includes a time-space hidden state and a feature-space hidden state.
双向注意力矩阵获得模块230,用于基于双向注意力机制,对所述时间空间隐状态和所述特征空间隐状态进行计算,获得双向注意力矩阵。The bidirectional attention matrix obtaining module 230 is configured to calculate the temporal and spatial hidden state and the feature space hidden state based on the bidirectional attention mechanism to obtain a bidirectional attention matrix.
进一步地,所述双向注意力矩阵获得模块230包括:第一全连接层获得子模块、第二全连接层获得子模块以及双向注意力矩阵获得子模块,其中:Further, the bidirectional attention matrix obtaining module 230 includes: a first fully connected layer obtaining submodule, a second fully connected layer obtaining submodule, and a bidirectional attention matrix obtaining submodule, wherein:
第一全连接层获得子模块,用于基于双向注意力机制,对所述时间空间隐状态进行计算,获得第一全连接层。The first fully connected layer obtaining sub-module is used to calculate the temporal and spatial hidden state based on the two-way attention mechanism to obtain the first fully connected layer.
进一步地,所述第一全连接层获得子模块包括:第一权重系数矩阵获取单元和第一全连接层获得单元,其中:Further, the first fully connected layer obtaining submodule includes: a first weight coefficient matrix obtaining unit and a first fully connected layer obtaining unit, wherein:
第一权重系数矩阵获取单元,用于获取第一权重系数矩阵。The first weight coefficient matrix obtaining unit is configured to obtain the first weight coefficient matrix.
第一全连接层获得单元,用于对所述第一权重系数矩阵和所述时间空间隐状态进行计算,获得第一全连接层。The first fully connected layer obtaining unit is configured to calculate the first weight coefficient matrix and the temporal and spatial hidden state to obtain the first fully connected layer.
进一步地,所述第一全连接层获得单元包括:第一全连接层获得子单元,其中:Further, the first fully connected layer obtaining unit includes: a first fully connected layer obtaining subunit, wherein:
第一全连接层获得子单元,用于基于
Figure PCTCN2020086194-appb-000016
对所述第一权重系数矩阵和所述时间空间隐状态进行计算,获得第一全连接层α t,其中,W α为第一权重系数矩阵,
Figure PCTCN2020086194-appb-000017
为时间空间隐状态。
The first fully connected layer obtains subunits for use based on
Figure PCTCN2020086194-appb-000016
Calculate the first weight coefficient matrix and the temporal and spatial hidden state to obtain the first fully connected layer α t , where W α is the first weight coefficient matrix,
Figure PCTCN2020086194-appb-000017
It is the hidden state of time and space.
第二全连接层获得子模块,用于基于双向注意力机制,对所述特征空间隐状态进行计算,获得第二全连接层。The second fully connected layer obtaining sub-module is used to calculate the hidden state of the feature space based on the two-way attention mechanism to obtain the second fully connected layer.
进一步地,所述第二全连接层获得子模块包括:第二权重系数矩阵获取单元和第二全连接层获得单元,其中:Further, the second fully connected layer obtaining submodule includes: a second weight coefficient matrix obtaining unit and a second fully connected layer obtaining unit, wherein:
第二权重系数矩阵获取单元,用于获取第二权重系数矩阵。The second weight coefficient matrix obtaining unit is used to obtain the second weight coefficient matrix.
第二全连接层获得单元,用于对所述第二权重系数矩阵和所述特征空间隐状态进行计算,获得第二全连接层。The second fully connected layer obtaining unit is configured to calculate the second weight coefficient matrix and the hidden state of the feature space to obtain a second fully connected layer.
进一步地,所述第二全连接层获得单元包括:第二全连接层获得子单元,其中:Further, the second fully connected layer obtaining unit includes: a second fully connected layer obtaining subunit, wherein:
第二全连接层获得子单元,用于基于β m=W βh m对所述第二权重系数矩阵和所述特征空间隐状态进行计算,获得第二全连接层β m,其中,W β为第二权重系数矩阵,h m为特征空间隐状态。 The second fully connected layer obtaining subunit is used to calculate the second weight coefficient matrix and the hidden state of the feature space based on β m =W β h m to obtain the second fully connected layer β m , where W β Is the second weight coefficient matrix, h m is the hidden state of the feature space.
双向注意力矩阵获得子模块,用于对所述第一全连接层和所述第二全连接层进行计算,获得所述双向注意力矩阵。The bidirectional attention matrix obtaining sub-module is used to calculate the first fully connected layer and the second fully connected layer to obtain the bidirectional attention matrix.
进一步地,所述双向注意力矩阵获得子模块包括:权重系数向量获取单元和双向注意力矩阵获得单元,其中:Further, the bidirectional attention matrix obtaining submodule includes: a weight coefficient vector obtaining unit and a bidirectional attention matrix obtaining unit, wherein:
权重系数向量获取单元,用于获取权重系数向量。The weight coefficient vector obtaining unit is used to obtain the weight coefficient vector.
双向注意力矩阵获得单元,用于对所述权重系数向量、所述第一全连接层以及所述第二 全连接层进行计算,获得所述双向注意力矩阵。The bidirectional attention matrix obtaining unit is configured to calculate the weight coefficient vector, the first fully connected layer, and the second fully connected layer to obtain the bidirectional attention matrix.
进一步地,所述双向注意力矩阵获得单元包括:双向注意力矩阵获得子单元,其中:Further, the bidirectional attention matrix obtaining unit includes: a bidirectional attention matrix obtaining subunit, wherein:
双向注意力矩阵获得子单元,用于基于r t m=W rtanh(α tm)对所述权重系数向量、所述第一全连接层以及所述第二全连接层进行计算,获得所述双向注意力矩阵r t m,其中,W r为权重系数向量,α t为第一全连接层,β m为第二全连接层。 The bidirectional attention matrix obtaining subunit is used to calculate the weight coefficient vector, the first fully connected layer, and the second fully connected layer based on r t m =W r tanh(α tm ), Obtain the bidirectional attention matrix r t m , where W r is the weight coefficient vector, α t is the first fully connected layer, and β m is the second fully connected layer.
待解码数据生成模块240,用于基于所述双向注意力矩阵和所述编码数据,生成待解码数据。The to-be-decoded data generation module 240 is configured to generate the to-be-decoded data based on the two-way attention matrix and the encoded data.
进一步地,所述待解码数据生成模块240包括:概率矩阵获得子模块和待解码数据生成子模块,其中:Further, the to-be-decoded data generation module 240 includes: a probability matrix obtaining sub-module and a to-be-decoded data generation sub-module, wherein:
概率矩阵获得子模块,用于基于softmax函数对所述双向注意力矩阵进行处理,获得概率矩阵。The probability matrix obtaining sub-module is used to process the bidirectional attention matrix based on the softmax function to obtain the probability matrix.
进一步地,所述概率矩阵获得子模块包括:概率矩阵获得单元,其中:Further, the probability matrix obtaining sub-module includes: a probability matrix obtaining unit, wherein:
概率矩阵获得单元,用于基于
Figure PCTCN2020086194-appb-000018
对所述双向注意力矩阵进行计算,获得所述概率矩阵
Figure PCTCN2020086194-appb-000019
其中,r t m为双向注意力矩阵。
Probability matrix acquisition unit, used based on
Figure PCTCN2020086194-appb-000018
Calculate the bidirectional attention matrix to obtain the probability matrix
Figure PCTCN2020086194-appb-000019
Among them, r t m is a two-way attention matrix.
待解码数据生成子模块,用于基于所述概率矩阵和所述编码数据,生成所述待解码数据。The to-be-decoded data generation sub-module is configured to generate the to-be-decoded data based on the probability matrix and the encoded data.
进一步地,所述待解码数据生成子模块,包括:待解码数据生成单元,其中:Further, the to-be-decoded data generation sub-module includes: a to-be-decoded data generation unit, wherein:
待解码数据生成单元,用于基于
Figure PCTCN2020086194-appb-000020
对所述概率矩阵和所述编码数据进行计算,获得所述待解码数据
Figure PCTCN2020086194-appb-000021
其中,
Figure PCTCN2020086194-appb-000022
为概率数据,
Figure PCTCN2020086194-appb-000023
为编码数据。
The data generating unit to be decoded is used to generate data based on
Figure PCTCN2020086194-appb-000020
Calculate the probability matrix and the encoded data to obtain the data to be decoded
Figure PCTCN2020086194-appb-000021
in,
Figure PCTCN2020086194-appb-000022
Is probabilistic data,
Figure PCTCN2020086194-appb-000023
Is the encoded data.
危险属性确定模块250,用于对所述待解码数据进行解码,获得所述用户数据的解码数据,并基于所述解码数据确定所述用户数据的危险属性。The dangerous attribute determination module 250 is configured to decode the data to be decoded, obtain decoded data of the user data, and determine the dangerous attribute of the user data based on the decoded data.
进一步地,所述危险属性确定模块250包括:解码数据获得子模块、第一危险属性确定子模块以及第二危险属性确定子模块,其中:Further, the dangerous attribute determining module 250 includes: a decoding data obtaining sub-module, a first dangerous attribute determining sub-module, and a second dangerous attribute determining sub-module, wherein:
解码数据获得子模块,用于对所述待解码数据进行解码,获得所述用户数据的解码数据。The decoded data obtaining sub-module is used to decode the data to be decoded to obtain decoded data of the user data.
第一危险属性确定子模块,用于当所述解码数据为第一数据时,确定所述用户数据的危险属性为危险。The first risk attribute determination sub-module is configured to determine that the risk attribute of the user data is dangerous when the decoded data is the first data.
第二危险属性确定子模块,用于当所述解码数据为第二数据时,确定所述用户数据的危险属性为不危险。The second risk attribute determination sub-module is configured to determine that the risk attribute of the user data is not dangerous when the decoded data is the second data.
进一步地,所述危险属性确定模块250还包括:请求响应子模块,其中:Further, the dangerous attribute determining module 250 further includes: a request response sub-module, wherein:
请求响应子模块,用于当接收到所述用户数据对应的信息请求时,响应所述信息请求。The request response submodule is configured to respond to the information request when the information request corresponding to the user data is received.
进一步地,所述危险属性确定模块250还包括:请求拒绝子模块,其中:Further, the dangerous attribute determination module 250 further includes: a request rejection sub-module, wherein:
请求拒绝子模块,用于当接收到所述用户数据对应的信息请求时,拒绝所述信息请求。The request rejection sub-module is configured to reject the information request when the information request corresponding to the user data is received.
进一步地,所述危险属性确定模块250还包括:提示信息发出子模块,其中:Further, the dangerous attribute determining module 250 further includes: a prompt message issuing submodule, wherein:
提示信息发出子模块,用于发出告警提示信息,并将所述用户数据添加至黑名单。The prompt information issuing sub-module is used for issuing alarm prompt information and adding the user data to the blacklist.
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述装置和模 块的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art can clearly understand that, for the convenience and conciseness of the description, the specific working process of the above described device and module can be referred to the corresponding process in the foregoing method embodiment, which will not be repeated here.
在本申请所提供的几个实施例中,模块相互之间的耦合可以是电性,机械或其它形式的耦合。In the several embodiments provided in this application, the coupling between the modules may be electrical, mechanical or other forms of coupling.
另外,在本申请各个实施例中的各功能模块可以集成在一个处理模块中,也可以是各个模块单独物理存在,也可以两个或两个以上模块集成在一个模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。In addition, the functional modules in the various embodiments of the present application may be integrated into one processing module, or each module may exist alone physically, or two or more modules may be integrated into one module. The above-mentioned integrated modules can be implemented in the form of hardware or software functional modules.
请参阅图9,其示出了本申请实施例提供的一种电子设备100的结构框图。该电子设备100可以是智能手机、平板电脑、电子书等能够运行应用程序的电子设备。本申请中的电子设备100可以包括一个或多个如下部件:处理器110、存储器120以及一个或多个应用程序,其中一个或多个应用程序可以被存储在存储器120中并被配置为由一个或多个处理器110执行,一个或多个程序配置用于执行如前述方法实施例所描述的方法。Please refer to FIG. 9, which shows a structural block diagram of an electronic device 100 provided by an embodiment of the present application. The electronic device 100 may be an electronic device capable of running application programs, such as a smart phone, a tablet computer, or an e-book. The electronic device 100 in this application may include one or more of the following components: a processor 110, a memory 120, and one or more application programs, where one or more application programs may be stored in the memory 120 and configured to be composed of one Or multiple processors 110 execute, and one or more programs are configured to execute the method described in the foregoing method embodiment.
其中,处理器110可以包括一个或者多个处理核。处理器110利用各种接口和线路连接整个电子设备100内的各个部分,通过运行或执行存储在存储器120内的指令、程序、代码集或指令集,以及调用存储在存储器120内的数据,执行电子设备100的各种功能和处理数据。可选地,处理器110可以采用数字信号处理(Digital Signal Processing,DSP)、现场可编程门阵列(Field-Programmable Gate Array,FPGA)、可编程逻辑阵列(Programmable Logic Array,PLA)中的至少一种硬件形式来实现。处理器110可集成中央处理器(Central Processing Unit,CPU)、图形处理器(Graphics Processing Unit,GPU)和调制解调器等中的一种或几种的组合。其中,CPU主要处理操作系统、用户界面和应用程序等;GPU用于负责待显示内容的渲染和绘制;调制解调器用于处理无线通信。可以理解的是,上述调制解调器也可以不集成到处理器110中,单独通过一块通信芯片进行实现。The processor 110 may include one or more processing cores. The processor 110 uses various interfaces and lines to connect various parts of the entire electronic device 100, and executes by running or executing instructions, programs, code sets, or instruction sets stored in the memory 120, and calling data stored in the memory 120. Various functions and processing data of the electronic device 100. Optionally, the processor 110 may adopt at least one of Digital Signal Processing (DSP), Field-Programmable Gate Array (FPGA), and Programmable Logic Array (PLA). A kind of hardware form to realize. The processor 110 may integrate one or a combination of a central processing unit (CPU), a graphics processing unit (GPU), a modem, and the like. Among them, the CPU mainly processes the operating system, user interface, and application programs; the GPU is used for rendering and drawing the content to be displayed; the modem is used for processing wireless communication. It is understandable that the above-mentioned modem may not be integrated into the processor 110, but may be implemented by a communication chip alone.
存储器120可以包括随机存储器(Random Access Memory,RAM),也可以包括只读存储器(Read-Only Memory)。存储器120可用于存储指令、程序、代码、代码集或指令集。存储器120可包括存储程序区和存储数据区,其中,存储程序区可存储用于实现操作系统的指令、用于实现至少一个功能的指令(比如触控功能、声音播放功能、图像播放功能等)、用于实现下述各个方法实施例的指令等。存储数据区还可以存储电子设备100在使用中所创建的数据(比如电话本、音视频数据、聊天记录数据)等。The memory 120 may include random access memory (RAM) or read-only memory (Read-Only Memory). The memory 120 may be used to store instructions, programs, codes, code sets or instruction sets. The memory 120 may include a program storage area and a data storage area, where the program storage area may store instructions for implementing the operating system and instructions for implementing at least one function (such as touch function, sound playback function, image playback function, etc.) , Instructions used to implement the following various method embodiments, etc. The storage data area can also store data (such as phone book, audio and video data, chat record data) created by the electronic device 100 during use.
请参阅图10,其示出了本申请实施例提供的一种计算机可读存储介质的结构框图。该计算机可读介质300中存储有程序代码,所述程序代码可被处理器调用执行上述方法实施例中所描述的方法。Please refer to FIG. 10, which shows a structural block diagram of a computer-readable storage medium provided by an embodiment of the present application. The computer-readable medium 300 stores program code, and the program code can be invoked by a processor to execute the method described in the foregoing method embodiment.
计算机可读存储介质300可以是诸如闪存、EEPROM(电可擦除可编程只读存储器)、EPROM、硬盘或者ROM之类的电子存储器。可选地,计算机可读存储介质300包括非易失性计算机可读介质(non-transitory computer-readable storage medium)。计算机可读存储介质300具有执行上述方法中的任何方法步骤的程序代码310的存储空间。这些程序代码可以从一个或者多个计算机程序产品中读出或者写入到这一个或者多个计算机程 序产品中。程序代码310可以例如以适当形式进行压缩。The computer-readable storage medium 300 may be an electronic memory such as flash memory, EEPROM (Electrically Erasable Programmable Read Only Memory), EPROM, hard disk, or ROM. Optionally, the computer-readable storage medium 300 includes a non-transitory computer-readable storage medium. The computer-readable storage medium 300 has storage space for the program code 310 for executing any method steps in the above-mentioned methods. These program codes can be read from or written into one or more computer program products. The program code 310 may be compressed in a suitable form, for example.
综上所述,本申请实施例提供的用户数据的危险属性确定方法、装置以及电子设备,获取用户数据,用户数据包括存在对应关系的时间数据和特征数据,对用户数据进行编码,获得用户数据的编码数据,该编码数据包括时间空间隐状态和特征空间隐状态,基于双向注意力机制,对时间空间隐状态和特征空间隐状态进行计算,获得双向注意力矩阵,基于双向注意力矩阵和编码数据,生成待解码数据,对待解码数据进行解码,获得用户数据的解码数据,并基于解码数据确定用户数据的危险属性,从而通过设计双向注意力机制嵌入到编码-解码结构中用来挖掘用户数据的危险属性,将时间空间的隐状态和特征空间的隐状态整合表征注意力,提升用户数据的危险属性的判定准确性。In summary, the method, device, and electronic device for determining the dangerous attributes of user data provided in the embodiments of the present application acquire user data, and the user data includes time data and characteristic data that have a corresponding relationship. The user data is encoded to obtain user data. The coded data includes time-space hidden state and feature-space hidden state. Based on the two-way attention mechanism, the time-space hidden state and feature-space hidden state are calculated to obtain a two-way attention matrix, based on the two-way attention matrix and coding Data, generate the data to be decoded, decode the data to be decoded, obtain the decoded data of the user data, and determine the dangerous attributes of the user data based on the decoded data, so as to design a two-way attention mechanism and embed it into the encoding-decoding structure to mine user data It integrates the hidden state of time and space and the hidden state of feature space to represent attention, and improves the accuracy of judging the dangerous attributes of user data.
最后应说明的是:以上实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不驱使相应技术方案的本质脱离本申请各实施例技术方案的精神和范围。Finally, it should be noted that the above embodiments are only used to illustrate the technical solutions of the application, not to limit them; although the application has been described in detail with reference to the foregoing embodiments, those of ordinary skill in the art should understand that: The technical solutions recorded in the foregoing embodiments are modified, or some of the technical features thereof are equivalently replaced; these modifications or replacements do not drive the essence of the corresponding technical solutions to deviate from the spirit and scope of the technical solutions of the embodiments of the present application.

Claims (20)

  1. 一种用户数据的危险属性确定方法,其特征在于,所述方法包括:A method for determining dangerous attributes of user data, characterized in that the method includes:
    获取用户数据,所述用户数据包括存在对应关系的时间数据和特征数据;Acquiring user data, where the user data includes time data and characteristic data that have a corresponding relationship;
    对所述用户数据进行编码,获得所述用户数据的编码数据,所述编码数据包括时间空间隐状态和特征空间隐状态;Encoding the user data to obtain encoded data of the user data, where the encoded data includes a time-space hidden state and a feature-space hidden state;
    基于双向注意力机制,对所述时间空间隐状态和所述特征空间隐状态进行计算,获得双向注意力矩阵;Based on a two-way attention mechanism, calculate the hidden state of the time space and the hidden state of the feature space to obtain a two-way attention matrix;
    基于所述双向注意力矩阵和所述编码数据,生成待解码数据;Generating data to be decoded based on the bidirectional attention matrix and the encoded data;
    对所述待解码数据进行解码,获得所述用户数据的解码数据,并基于所述解码数据确定所述用户数据的危险属性。The data to be decoded is decoded to obtain the decoded data of the user data, and the dangerous attribute of the user data is determined based on the decoded data.
  2. 根据权利要求1所述的方法,其特征在于,所述基于双向注意力机制,对所述时间空间隐状态和所述特征空间隐状态进行计算,获得双向注意力矩阵,包括:The method according to claim 1, wherein the calculation of the temporal and spatial hidden state and the feature space hidden state based on a two-way attention mechanism to obtain a two-way attention matrix comprises:
    基于双向注意力机制,对所述时间空间隐状态进行计算,获得第一全连接层;Based on the two-way attention mechanism, calculate the temporal and spatial hidden state to obtain the first fully connected layer;
    基于双向注意力机制,对所述特征空间隐状态进行计算,获得第二全连接层;Based on the two-way attention mechanism, calculate the hidden state of the feature space to obtain the second fully connected layer;
    对所述第一全连接层和所述第二全连接层进行计算,获得所述双向注意力矩阵。Perform calculations on the first fully connected layer and the second fully connected layer to obtain the bidirectional attention matrix.
  3. 根据权利要求2所述的方法,其特征在于,所述基于双向注意力机制,对所述时间空间隐状态进行计算,获得第一全连接层,包括:The method according to claim 2, wherein the calculating the temporal and spatial hidden state based on the two-way attention mechanism to obtain the first fully connected layer comprises:
    获取第一权重系数矩阵;Obtain the first weight coefficient matrix;
    对所述第一权重系数矩阵和所述时间空间隐状态进行计算,获得第一全连接层。The first weight coefficient matrix and the time-space hidden state are calculated to obtain the first fully connected layer.
  4. 根据权利要求3所述的方法,其特征在于,所述对所述第一权重系数矩阵和所述时间空间隐状态进行计算,获得第一全连接层,包括:The method according to claim 3, wherein the calculating the first weight coefficient matrix and the temporal and spatial hidden state to obtain the first fully connected layer comprises:
    基于
    Figure PCTCN2020086194-appb-100001
    对所述第一权重系数矩阵和所述时间空间隐状态进行计算,获得第一全连接层α t,其中,W α为第一权重系数矩阵,
    Figure PCTCN2020086194-appb-100002
    为时间空间隐状态。
    based on
    Figure PCTCN2020086194-appb-100001
    Calculate the first weight coefficient matrix and the temporal and spatial hidden state to obtain the first fully connected layer α t , where W α is the first weight coefficient matrix,
    Figure PCTCN2020086194-appb-100002
    It is the hidden state of time and space.
  5. 根据权利要求4所述的方法,其特征在于,所述基于双向注意力机制,对所述特征空间隐状态进行计算,获得第二全连接层,包括:The method according to claim 4, wherein the calculating the hidden state of the feature space based on the bidirectional attention mechanism to obtain the second fully connected layer comprises:
    获取第二权重系数矩阵;Obtaining the second weight coefficient matrix;
    对所述第二权重系数矩阵和所述特征空间隐状态进行计算,获得第二全连接层。The second weight coefficient matrix and the hidden state of the feature space are calculated to obtain a second fully connected layer.
  6. 根据权利要求5所述的方法,其特征在于,所述对所述第二权重系数矩阵和所述特征空间隐状态进行计算,获得第二全连接层,包括:The method according to claim 5, wherein the calculating the second weight coefficient matrix and the hidden state of the feature space to obtain a second fully connected layer comprises:
    基于β m=W βh m对所述第二权重系数矩阵和所述特征空间隐状态进行计算,获得第二全连接层β m,其中,W β为第二权重系数矩阵,h m为特征空间隐状态。 Calculate the second weight coefficient matrix and the hidden state of the feature space based on β m =W β h m to obtain a second fully connected layer β m , where W β is the second weight coefficient matrix, and h m is the feature Space hidden state.
  7. 根据权利要求6所述的方法,其特征在于,所述对所述第一全连接层和所述第二全连接层进行计算,获得所述双向注意力矩阵,包括:The method according to claim 6, wherein the calculating the first fully connected layer and the second fully connected layer to obtain the two-way attention matrix comprises:
    获取权重系数向量;Obtain the weight coefficient vector;
    对所述权重系数向量、所述第一全连接层以及所述第二全连接层进行计算,获得所述双向注意力矩阵。The weight coefficient vector, the first fully connected layer, and the second fully connected layer are calculated to obtain the bidirectional attention matrix.
  8. 根据权利要求7所述的方法,其特征在于,所述对所述权重系数向量、所述第一全连接层以及所述第二全连接层进行计算,获得所述双向注意力矩阵,包括:The method according to claim 7, wherein the calculating the weight coefficient vector, the first fully connected layer, and the second fully connected layer to obtain the two-way attention matrix comprises:
    基于
    Figure PCTCN2020086194-appb-100003
    对所述权重系数向量、所述第一全连接层以及所述第二全连接层进行计算,获得所述双向注意力矩阵r t m,其中,W r为权重系数向量,α t为第一全连接层,β m为第二全连接层。
    based on
    Figure PCTCN2020086194-appb-100003
    The weight coefficient vector, the first fully connected layer, and the second fully connected layer are calculated to obtain the bidirectional attention matrix r t m , where W r is the weight coefficient vector, and α t is the first Fully connected layer, β m is the second fully connected layer.
  9. 根据权利要求8所述的方法,其特征在于,所述第一权重系数矩阵为
    Figure PCTCN2020086194-appb-100004
    所述第二权重系数矩阵为
    Figure PCTCN2020086194-appb-100005
    所述权重系数向量为
    Figure PCTCN2020086194-appb-100006
    The method according to claim 8, wherein the first weight coefficient matrix is
    Figure PCTCN2020086194-appb-100004
    The second weight coefficient matrix is
    Figure PCTCN2020086194-appb-100005
    The weight coefficient vector is
    Figure PCTCN2020086194-appb-100006
  10. 根据权利要求8或9所述的方法,其特征在于,所述基于所述双向注意力矩阵和所述编码数据,生成待解码数据,包括:The method according to claim 8 or 9, wherein the generating data to be decoded based on the two-way attention matrix and the encoded data comprises:
    基于softmax函数对所述双向注意力矩阵进行处理,获得概率矩阵;Processing the bidirectional attention matrix based on the softmax function to obtain a probability matrix;
    基于所述概率矩阵和所述编码数据,生成所述待解码数据。Based on the probability matrix and the encoded data, the data to be decoded is generated.
  11. 根据权利要求10所述的方法,其特征在于,所述基于softmax函数对所述双向注意力矩阵进行处理,获得概率矩阵,包括:The method according to claim 10, wherein the processing the bidirectional attention matrix based on a softmax function to obtain a probability matrix comprises:
    基于
    Figure PCTCN2020086194-appb-100007
    对所述双向注意力矩阵进行计算,获得所述概率矩阵
    Figure PCTCN2020086194-appb-100008
    其中,r t m为双向注意力矩阵。
    based on
    Figure PCTCN2020086194-appb-100007
    Calculate the bidirectional attention matrix to obtain the probability matrix
    Figure PCTCN2020086194-appb-100008
    Among them, r t m is a two-way attention matrix.
  12. 根据权利要求11所述的方法,其特征在于,所述基于所述概率矩阵和所述编码数据,生成所述待解码数据,包括:The method according to claim 11, wherein said generating said data to be decoded based on said probability matrix and said encoded data comprises:
    基于
    Figure PCTCN2020086194-appb-100009
    对所述概率矩阵和所述编码数据进行计算,获得所述待解码数据
    Figure PCTCN2020086194-appb-100010
    其中,
    Figure PCTCN2020086194-appb-100011
    为概率数据,
    Figure PCTCN2020086194-appb-100012
    为编码数据。
    based on
    Figure PCTCN2020086194-appb-100009
    Calculate the probability matrix and the encoded data to obtain the data to be decoded
    Figure PCTCN2020086194-appb-100010
    in,
    Figure PCTCN2020086194-appb-100011
    Is probabilistic data,
    Figure PCTCN2020086194-appb-100012
    Is the encoded data.
  13. 根据权利要求1-12任一项所述的方法,其特征在于,所述编码数据为
    Figure PCTCN2020086194-appb-100013
    其中,T表示序列长度,M表示隐状态的长度,
    Figure PCTCN2020086194-appb-100014
    标识以序列长度为T,隐状态的长度为M的编码数据隐状态。
    The method according to any one of claims 1-12, wherein the encoded data is
    Figure PCTCN2020086194-appb-100013
    Among them, T represents the length of the sequence, M represents the length of the hidden state,
    Figure PCTCN2020086194-appb-100014
    Identify the hidden state of encoded data with sequence length T and hidden state length M.
  14. 根据权利要求1-13任一项所述的方法,其特征在于,所述对所述待解码数据进行解码,获得所述用户数据的解码数据,并基于所述解码数据确定所述用户数据的危险属性,包括:The method according to any one of claims 1-13, wherein the decoding of the to-be-decoded data to obtain the decoded data of the user data, and the determination of the user data based on the decoded data Dangerous attributes, including:
    对所述待解码数据进行解码,获得所述用户数据的解码数据;Decode the data to be decoded to obtain decoded data of the user data;
    当所述解码数据为第一数据时,确定所述用户数据的危险属性为危险;When the decoded data is the first data, it is determined that the dangerous attribute of the user data is dangerous;
    当所述解码数据为第二数据时,确定所述用户数据的危险属性为不危险。When the decoded data is the second data, it is determined that the dangerous attribute of the user data is not dangerous.
  15. 根据权利要求14所述的方法,其特征在于,所述当所述解码数据为第二数据时,确定所述用户数据的危险属性为不危险之后,还包括:The method according to claim 14, wherein, when the decoded data is the second data, after determining that the dangerous attribute of the user data is not dangerous, the method further comprises:
    当接收到所述用户数据对应的信息请求时,响应所述信息请求。When receiving the information request corresponding to the user data, respond to the information request.
  16. 根据权利要求14或15所述的方法,其特征在于,所述当所述解码数据为第一数据时,确定所述用户数据的危险属性为危险之后,还包括:The method according to claim 14 or 15, wherein when the decoded data is the first data, after determining that the dangerous attribute of the user data is dangerous, the method further comprises:
    当接收到所述用户数据对应的信息请求时,拒绝所述信息请求。When the information request corresponding to the user data is received, the information request is rejected.
  17. 根据权利要求14-16任一项所述的方法,其特征在于,所述当所述解码数据为第一数据时,确定所述用户数据的危险属性为危险之后,还包括:The method according to any one of claims 14-16, wherein when the decoded data is the first data, after determining that the risk attribute of the user data is dangerous, the method further comprises:
    发出告警提示信息,并将所述用户数据添加至黑名单。A warning message is issued, and the user data is added to the blacklist.
  18. 一种用户数据的危险属性确定装置,其特征在于,所述装置包括:A device for determining dangerous attributes of user data, characterized in that the device comprises:
    用户数据获取模块,用于获取用户数据,所述用户数据包括存在对应关系的时间数据和特征数据;The user data acquisition module is configured to acquire user data, where the user data includes time data and characteristic data that have a corresponding relationship;
    编码数据获得模块,用于对所述用户数据进行编码,获得所述用户数据的编码数据,所述编码数据包括时间空间隐状态和特征空间隐状态;The coded data obtaining module is configured to code the user data to obtain coded data of the user data, the coded data including time-space hidden state and feature-space hidden state;
    双向注意力矩阵获得模块,用于基于双向注意力机制,对所述时间空间隐状态和所述特征空间隐状态进行计算,获得双向注意力矩阵;A two-way attention matrix obtaining module is used to calculate the hidden state of the time space and the hidden state of the feature space based on the two-way attention mechanism to obtain a two-way attention matrix;
    待解码数据生成模块,用于基于所述双向注意力矩阵和所述编码数据,生成待解码数据;A data generating module to be decoded, configured to generate data to be decoded based on the two-way attention matrix and the encoded data;
    危险属性确定模块,用于对所述待解码数据进行解码,获得所述用户数据的解码数据,并基于所述解码数据确定所述用户数据的危险属性。The dangerous attribute determination module is configured to decode the data to be decoded, obtain decoded data of the user data, and determine the dangerous attribute of the user data based on the decoded data.
  19. 一种电子设备,其特征在于,包括存储器和处理器,所述存储器耦接到所述处理器,所述存储器存储指令,当所述指令由所述处理器执行时所述处理器执行如权利要求1-17任一项所述的方法。An electronic device, comprising a memory and a processor, the memory is coupled to the processor, the memory stores instructions, and the processor executes the instructions when the instructions are executed by the processor. The method of any one of 1-17 is required.
  20. 一种计算机可读取存储介质,其特征在于,所述计算机可读取存储介质中存储有程序代码,所述程序代码可被处理器调用执行如权利要求1-17任一项所述的方法。A computer-readable storage medium, wherein the computer-readable storage medium stores program code, and the program code can be called by a processor to execute the method according to any one of claims 1-17 .
PCT/CN2020/086194 2020-04-22 2020-04-22 Method and apparatus for determining risky attribute of user data, and electronic device WO2021212377A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2020/086194 WO2021212377A1 (en) 2020-04-22 2020-04-22 Method and apparatus for determining risky attribute of user data, and electronic device
CN202080094382.2A CN115066699A (en) 2020-04-22 2020-04-22 Method and device for determining danger attribute of user data and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/086194 WO2021212377A1 (en) 2020-04-22 2020-04-22 Method and apparatus for determining risky attribute of user data, and electronic device

Publications (1)

Publication Number Publication Date
WO2021212377A1 true WO2021212377A1 (en) 2021-10-28

Family

ID=78270955

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/086194 WO2021212377A1 (en) 2020-04-22 2020-04-22 Method and apparatus for determining risky attribute of user data, and electronic device

Country Status (2)

Country Link
CN (1) CN115066699A (en)
WO (1) WO2021212377A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108734338A (en) * 2018-04-24 2018-11-02 阿里巴巴集团控股有限公司 Credit risk forecast method and device based on LSTM models
CN109492227A (en) * 2018-11-16 2019-03-19 大连理工大学 It is a kind of that understanding method is read based on the machine of bull attention mechanism and Dynamic iterations
CN109948649A (en) * 2019-02-04 2019-06-28 复旦大学 The softward interview behavioral data character representation method of data-oriented opening and shares
CN110853626A (en) * 2019-10-21 2020-02-28 成都信息工程大学 Bidirectional attention neural network-based dialogue understanding method, device and equipment
CN111027058A (en) * 2019-11-12 2020-04-17 深圳供电局有限公司 Method for detecting data attack in power system, computer equipment and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108734338A (en) * 2018-04-24 2018-11-02 阿里巴巴集团控股有限公司 Credit risk forecast method and device based on LSTM models
CN109492227A (en) * 2018-11-16 2019-03-19 大连理工大学 It is a kind of that understanding method is read based on the machine of bull attention mechanism and Dynamic iterations
CN109948649A (en) * 2019-02-04 2019-06-28 复旦大学 The softward interview behavioral data character representation method of data-oriented opening and shares
CN110853626A (en) * 2019-10-21 2020-02-28 成都信息工程大学 Bidirectional attention neural network-based dialogue understanding method, device and equipment
CN111027058A (en) * 2019-11-12 2020-04-17 深圳供电局有限公司 Method for detecting data attack in power system, computer equipment and storage medium

Also Published As

Publication number Publication date
CN115066699A (en) 2022-09-16

Similar Documents

Publication Publication Date Title
CN111695674B (en) Federal learning method, federal learning device, federal learning computer device, and federal learning computer readable storage medium
CN112732911B (en) Semantic recognition-based speaking recommendation method, device, equipment and storage medium
JP2023500222A (en) Sequence mining model training method, sequence data processing method, sequence mining model training device, sequence data processing device, computer equipment, and computer program
CN112149699B (en) Method and device for generating model and method and device for identifying image
CN113538070B (en) User life value cycle detection method and device and computer equipment
CN113779277A (en) Method and device for generating text
JP2024508502A (en) Methods and devices for pushing information
WO2022105118A1 (en) Image-based health status identification method and apparatus, device and storage medium
CN113723607A (en) Training method, device and equipment of space-time data processing model and storage medium
WO2021212377A1 (en) Method and apparatus for determining risky attribute of user data, and electronic device
CN111340574A (en) Risk user identification method and device and electronic equipment
WO2022105117A1 (en) Method and device for image quality assessment, computer device, and storage medium
CN109754319B (en) Credit score determination system, method, terminal and server
CN115757725A (en) Question and answer processing method and device, computer equipment and storage medium
CN111914535B (en) Word recognition method and device, computer equipment and storage medium
CN115050371A (en) Speech recognition method, speech recognition device, computer equipment and storage medium
CN116129534A (en) Image living body detection method and device, storage medium and electronic equipment
CN113780318B (en) Method, device, server and medium for generating prompt information
CN111915701A (en) Button image generation method and device based on artificial intelligence
CN111144935A (en) Big data-based sleep member awakening method and system, server and medium
CN112418292B (en) Image quality evaluation method, device, computer equipment and storage medium
CN116740540B (en) Data processing method, device, equipment and computer readable storage medium
CN116911304B (en) Text recommendation method and device
CN113239215B (en) Classification method and device for multimedia resources, electronic equipment and storage medium
CN117172632B (en) Enterprise abnormal behavior detection method, device, equipment and storage medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20932593

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 09.03.2023)

122 Ep: pct application non-entry in european phase

Ref document number: 20932593

Country of ref document: EP

Kind code of ref document: A1