WO2024007599A1 - Heterogeneous graph neural network-based method and apparatus for determining target service - Google Patents
Heterogeneous graph neural network-based method and apparatus for determining target service Download PDFInfo
- Publication number
- WO2024007599A1 WO2024007599A1 PCT/CN2023/077879 CN2023077879W WO2024007599A1 WO 2024007599 A1 WO2024007599 A1 WO 2024007599A1 CN 2023077879 W CN2023077879 W CN 2023077879W WO 2024007599 A1 WO2024007599 A1 WO 2024007599A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- target
- evaluated
- attention weight
- social
- trust
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 49
- 238000013528 artificial neural network Methods 0.000 title claims abstract description 26
- 238000012549 training Methods 0.000 claims description 27
- 238000004364 calculation method Methods 0.000 claims description 22
- 230000006870 function Effects 0.000 claims description 12
- 238000013210 evaluation model Methods 0.000 claims description 11
- 238000004590 computer program Methods 0.000 claims description 10
- 238000011156 evaluation Methods 0.000 claims description 10
- 238000013527 convolutional neural network Methods 0.000 claims description 6
- 238000003062 neural network model Methods 0.000 claims description 3
- 230000004044 response Effects 0.000 abstract description 4
- 230000010365 information processing Effects 0.000 abstract description 2
- 238000004891 communication Methods 0.000 description 8
- 230000003993 interaction Effects 0.000 description 7
- 230000008859 change Effects 0.000 description 5
- 238000012545 processing Methods 0.000 description 5
- 238000010586 diagram Methods 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 3
- 238000013475 authorization Methods 0.000 description 2
- 230000003542 behavioural effect Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 238000013145 classification model Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- 230000009467 reduction Effects 0.000 description 2
- 230000001133 acceleration Effects 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 238000009472 formulation Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000010921 in-depth analysis Methods 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000035515 penetration Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000007619 statistical method Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0639—Performance analysis of employees; Performance analysis of enterprise or organisation operations
- G06Q10/06393—Score-carding, benchmarking or key performance indicator [KPI] analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/08—Learning methods
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/01—Social networking
Definitions
- the invention belongs to the technical field of computer information processing, and more specifically relates to a target service determination method, device, electronic equipment and computer-readable medium based on heterogeneous graph neural network.
- the present invention aims to solve the technical problem of how to accurately predict the trust degree of a target to be evaluated when there is less information.
- one aspect of the present invention proposes a target service determination method based on heterogeneous graph neural network, including:
- the service policy of the target to be evaluated is determined and pushed.
- constructing a heterogeneous social relationship graph with different types of social relationships based on the social information and determining the attention weight corresponding to the target to be evaluated further includes:
- inputting the attention weight into a preset security evaluation model to calculate the trust degree of the target to be evaluated further includes:
- a weighted sum of the edge attention weights is used to obtain an edge attention weight vector
- the node attention weight vector and edge attention weight vector of the target to be evaluated are respectively input into the security evaluation model to obtain the trust degree of the target to be evaluated.
- determining the service strategy of the target to be evaluated based on the comparison result of the trust trend strategy and pushing it further includes:
- a corresponding service policy is provided according to the trust threshold interval in which the trust level of the target to be evaluated is located.
- obtaining the social information of the target to be evaluated further includes:
- Obtain the social relationship information of the target to be evaluated including call information, address book information and geographical location information.
- the method before constructing a social relationship heterogeneous graph with different types of social relationships based on the social information and determining the attention weight corresponding to the target to be evaluated, the method further includes:
- the attention weight vector is input into the convolutional neural network model for training to obtain the security assessment model.
- inputting the attention weight vector into a convolutional neural network model for training to obtain the security assessment model further includes:
- the model parameters are adjusted through the loss function to minimize the error between the security score output by the model and the actual security score of the historical users, and finally the security assessment model is obtained.
- the method further includes:
- the training samples are regularly updated, and the security assessment model is updated based on the updated training samples.
- a second aspect of the present invention proposes a target service determination device based on a heterogeneous graph neural network, including:
- Information acquisition module used to obtain social information of the target to be evaluated
- An attention weight calculation module configured to construct a heterogeneous social relationship graph with different types of social relationships based on the social information, and determine the attention weight corresponding to the target to be evaluated;
- An evaluation module configured to input the attention weight into a preset security evaluation model to calculate the trust degree of the target to be evaluated
- a service determination module configured to determine and push the service policy of the target to be evaluated based on the comparison result between the trust degree and the trust degree trend policy.
- the attention weight calculation module further includes:
- a social relationship heterogeneous graph creation unit is used to construct a social relationship heterogeneous graph using targets that have a social relationship with the target to be evaluated as neighbor nodes and social information between targets as edges;
- the node attention weight calculation unit is used to calculate the node attention weight between different neighbor nodes and the target to be evaluated based on the social relationship heterogeneous graph;
- An edge attention weight calculation unit is used to calculate edge attention weights between the target to be evaluated and each neighbor node according to the node attention weight.
- the evaluation module further includes:
- a node attention weight vector calculation unit is used to perform a weighted sum of the node attention weights to obtain a node attention weight vector
- An edge attention weight vector calculation unit is used to perform a weighted sum of the edge attention weights to obtain an edge attention weight vector
- An evaluation unit is used to respectively input the node attention weight vector and the edge attention weight vector of the target to be evaluated into the security evaluation model to obtain the trust degree of the target to be evaluated.
- a third aspect of the present invention proposes an electronic device, including a processor and a memory.
- the memory is used to store a computer executable program.
- the processor executes the method. .
- a fourth aspect of the present invention also provides a computer-readable medium that stores a computer-executable program. When the computer-executable program is executed, the method is implemented.
- This invention obtains the social information of the target to be evaluated, builds a heterogeneous social relationship graph with different types of social relationships based on the social information, determines the attention weight corresponding to the target to be evaluated, and inputs the attention weight vector into the preset
- the security assessment model calculates the trust degree of the target to be evaluated.
- the trust degree obtained through the social relationship of the target to be evaluated allows the service provider to make timely response strategies before providing services to avoid mismatches in the provided services. loss caused and ensure the data security of the service.
- Figure 1 is a system block diagram of a target service determination method and device based on a heterogeneous graph neural network according to an embodiment of the present invention
- Figure 2 is a schematic flow chart of a method for determining target services based on heterogeneous graph neural networks according to one embodiment of the present invention
- Figure 3 is a schematic diagram of a target service determination device based on a heterogeneous graph neural network according to an embodiment of the present invention.
- the present invention proposes a target service determination method based on a heterogeneous graph neural network.
- a target service determination method based on a heterogeneous graph neural network.
- Figure 1 is a system block diagram of a target service determination method and device based on a heterogeneous graph neural network according to an exemplary embodiment.
- the system architecture 100 may include one or more of user terminals 101, 102, 103, a network 104 and a server 105.
- Network 104 is a medium used to provide communication links between user terminals 101, 102, 103 and server 105.
- Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
- the number of user terminals, networks and servers in Figure 1 is only illustrative. Depending on implementation needs, there can be any number of user terminals, networks, and servers.
- the server 105 may be a server cluster composed of multiple servers.
- Users can use user terminals 101, 102, 103 to interact with the server 105 through the network 104 to receive or send messages, etc.
- the user terminals 101, 102, and 103 may be various electronic devices with display screens, including but not limited to smart phones, tablet computers, portable computers, desktop computers, and so on.
- the device security level identification method provided by the embodiment of the present invention is generally executed by the server 105.
- the device security level identification device is generally provided in the server 105.
- some terminals may have functions similar to those of the server to perform this method. Therefore, the device security level identification method provided by the embodiment of the present invention is not limited to being executed on the server side.
- Figure 2 is a schematic flowchart of a method for determining target services based on heterogeneous graph neural networks according to one embodiment of the present invention.
- this method includes:
- the target to be evaluated may be an individual user or an enterprise user.
- the social information may include basic information authorized by the user.
- the basic information may be call information, telephone communication Directory information, social software address book, user location information, transaction information, interactive information, etc.
- social information can also include behavioral information.
- behavioral information can be transaction information between users, communication information between users, etc.
- the social information can be equity penetration information between enterprises, news information between enterprises, social information of managers within the enterprise, etc.; the specific content of the social information can be determined according to the actual application scenario. , there is no restriction here.
- the node to be identified can be a user
- the social information is the interaction information between the user and other users.
- the interaction information can include: interactions on the Internet, appearing together in the same geographical location at the same time, sharing through the same hardware device, etc. Determine whether there is an association between users by whether there is interaction, and then generate the associated user according to the method in this application, and then based on the behavior of the associated user (for example, whether there are violations, whether there are bad records, etc.) To determine whether the associated user is a suspicious person who will affect the security of user information.
- the node to be identified may also be a terminal device or a server, where the social information may be data interaction information, data transmission information, device status information, etc. in the terminal device or server.
- the node to be identified can be a terminal device
- the social information can be other terminals that have had data transmission with the terminal device, or other terminals in the same network segment as the terminal device, or It is another terminal under the same company name as the terminal device.
- the associated terminal of the terminal device can be determined by whether data has been transmitted between the terminal devices and whether there is a physical connection relationship between the terminal devices.
- social information can be attention information or communication information between terminal devices or social accounts used by users; or transaction information between different targets; or, information stored in the device obtained with user authorization.
- the target to be evaluated is used as an example.
- the social information of the target to be evaluated is first obtained.
- the social information can include transaction information, call information, interactions on the Internet, and people in the same geographical location. The locations appear and go together at the same time, the same hardware device has been shared, etc.
- the above social situation can be data disclosed by users using communication devices on the Internet service platform.
- the social association can be a temporary association, such as a certain Users who have had a phone call relationship with the user for one day, or are geographically close; it can also be a permanent association, such as family association, users in the phone address book, work unit association, etc. There are no specific restrictions here.
- the protection of user privacy can be achieved by deleting or anonymizing information in user information that can identify the user's identity.
- Anonymization can process data through encryption.
- S202 Construct a social relationship heterogeneous graph with different types of social relationships based on the social information, and determine the attention weight corresponding to the target to be evaluated.
- the security assessment model in the embodiment of the present invention, it is obtained through training with a large number of historical sample data.
- the social information of each historical user is obtained as a training sample
- a social relationship heterogeneous graph is constructed based on the training sample, and the historical users are calculated
- the attention weight vector since the security situation of historical users is known, use the known safety situation as a label, input the attention weight vector obtained from these training samples into the model for training, and the output security score is consistent with the historical user Compare the actual safety scores, and adjust the model parameters through the loss function to minimize the error between the safety scores output by the model and the actual safety scores of historical users, and finally obtain a safety assessment model.
- the models used in the embodiments of the present invention include but are not limited to convolutional neural networks. network model.
- a social relationship heterogeneous graph is constructed based on the social information, in which the mobile phone number of the target to be evaluated is used as the user to be evaluated, and the users who have a social relationship with the target to be evaluated are respectively Each user serves as a neighbor node, and the corresponding social relationships between users are used as edges to construct a heterogeneous social relationship graph.
- Social relationships can be divided into different types, such as call relationships, address book relationships, geographical location relationships, etc.
- This invention calculates the attention weight of the target to be evaluated through two aspects: node dimensions and view dimensions.
- Node dimension Use the following formula to calculate the attention weight of the node dimension:
- u represents the user to be evaluated
- i represents the neighbor node
- Represents the attention vector of neighbor node k that needs to be learned under the current social relationship heterogeneous graph.
- the attention vector represented is a vector composed of the social relationship between the user to be evaluated and the neighbor node i; further, the vector can also be formed according to the score corresponding to the social relationship. For example, there may be many differences between the user to be evaluated and the neighbor node In this solution, corresponding scores can be given to different social relationships, or a scoring function can be set to score each different social relationship, and the scores corresponding to various social relationships can be composed of attention vector.
- the calculated attention weight ⁇ ui is normalized.
- ⁇ uk represents the attention weight between the user to be evaluated and neighbor node k
- e uk represents the feature vector of neighbor node k of the user to be evaluated.
- users compare the influence between neighbor nodes of the same user social relationship and the user to be evaluated, such as comparing neighbor nodes in the user's call information, comparing neighbor nodes in the user's address book information, and comparing neighbor nodes near the user's geographical location. Compare.
- ReLU is the linear rectification function
- the node attention weight vector wi is the characteristic of neighbor node i
- b is the bias term
- the initial value is a preset constant
- the function of the front connection layer is rectified through a linear rectification function to obtain the node attention weight vector.
- the calculation method is the same as calculating the node attention coefficient. Finally, a weighted sum is performed, and each view is spliced to obtain the final edge attention weight vector: k is included in
- edge attention weight of the edge between the target to be evaluated and neighbor node i is the i-th element in the node attention weight vector
- feature vector of the edge between the target to be evaluated and neighbor node i is the k-th element in the node attention weight vector
- feature vector of the edge between the target to be evaluated and neighbor node k is the feature vector of the edge between the target to be evaluated and neighbor node k
- concat represents the merging function
- View dimension users compare the influence of nodes between different users' social relationships, for example, compare the influence of users' call information nodes and users' address book nodes on the target to be evaluated, or compare the influence of users' address book information nodes and nodes near the user's geographical location on the target to be evaluated. Evaluate the impact of your goals, etc.
- the edge attention weights between neighbor nodes with the same type of social relationship and the user to be evaluated can be summarized to obtain
- the average edge attention weight of nodes of this type of social relationship is used as the edge attention weight of each neighbor node of this type of social relationship and the user to be evaluated to reduce the impact of excessive attention on a single target on calculations , through this step, the average degree of attention of the users to be evaluated to the goals of different types of social relationships can be obtained. From a macro perspective, the attention of the users to be evaluated to the goals of different social relationships can be obtained, and the overall impact of excessive attention to a single target can be reduced. , improve prediction accuracy.
- the summary method can adopt mean calculation, harmonic average, weighted average, etc. Furthermore, the variance or volatility of the edge attention weights between nodes with the same type of social relationship and the user to be evaluated can be determined. Based on the variance or volatility, the attention of the user to be evaluated to the node with this type of social relationship can be effectively determined. Power, that is, to determine the impact of nodes with different types of social relationships on the users to be evaluated.
- the node attention weight vector and edge attention weight vector of the target to be evaluated which are obtained by the weighted sum of the attention weight coefficients, are respectively input into the security assessment model trained in the above embodiment, and the values of the targets to be evaluated between the same social relationships are obtained. Trust, as well as the trust of the target to be evaluated between different social relationships, and finally the user's trust is obtained through comprehensive evaluation using different strategies.
- the text classification model in order to ensure the accuracy of the results output by the text classification model, it is necessary to regularly update the training samples, select training samples that are relatively recent, count the trust of the samples, and train the security assessment model based on the updated samples, and evaluate the security assessment model. parameters are updated.
- This invention obtains the social information of the target to be evaluated, builds a heterogeneous social relationship graph with different types of social relationships based on the social information, determines the attention weight corresponding to the target to be evaluated, and inputs the attention weight vector into the preset
- the security assessment model calculates the trust of the target to be evaluated, which solves the problem that user trust cannot be predicted through user characteristics or the prediction results are inaccurate when there is little user data. Users should make timely response strategies before performing services to avoid losses and improve service security.
- the trust trend strategy can be a preset trust threshold, and the statistical analysis value for the target is extracted from the user data of a large number of historical users to generate multiple preset trust intervals.
- the trust trend strategy can also set trust thresholds based on the trend of changes in trust over time. For example, you can set multiple different baseline trust thresholds and a unit trust degree threshold.
- Multiple different baseline trust degree thresholds are Subtract the reduction rate multiplied by the unit trust threshold to obtain the trust threshold corresponding to the current trust change trend, and determine the final service strategy based on the multiple trust thresholds obtained.
- the base trust threshold plus the growth rate multiplied by the unit trust threshold are used to determine the final service strategy based on the multiple trust thresholds obtained.
- different trust thresholds can be set under different trust trends to improve the accuracy of pushed services.
- the storage medium can be a readable storage medium such as a magnetic disk, an optical disk, a ROM, or a RAM, or it can be a storage array composed of multiple storage media, such as a magnetic disk or a storage medium. Tape storage array.
- the storage medium is not limited to centralized storage, it can also be distributed storage, such as cloud storage based on cloud computing.
- the following describes a device embodiment of the present invention, which device can be used to perform the method embodiment of the present invention. Details described in the device embodiments of the present invention should be regarded as supplements to the above method embodiments; details not disclosed in the device embodiments of the present invention can be implemented with reference to the above method embodiments.
- Figure 3 is a schematic diagram of a target service determination device based on a heterogeneous graph neural network according to one embodiment of the present invention. As shown in Figure 3, the device 300 includes:
- Information acquisition module 301 used to acquire social information of the target to be evaluated
- the attention weight calculation module 302 is used to construct a social relationship heterogeneous graph with different types of social relationships based on the social information, and determine the attention weight corresponding to the target to be evaluated;
- Evaluation module 303 configured to input the attention weight into a preset security evaluation model to calculate the trust degree of the target to be evaluated;
- the service determination module 304 is configured to determine and push the service policy of the target to be evaluated based on the comparison result between the trust degree and the trust degree trend policy.
- the information acquisition module 301 further includes:
- Social relationship acquisition unit used to obtain social relationship information of the target to be evaluated, including call information, address book information and geographical location information.
- the device further includes a model training module for using the social information of historical users as training samples; constructing a social relationship heterogeneous graph based on the training samples, and calculating the attention weight of the historical users Vector; input the attention weight vector into the convolutional neural network model for training to obtain the security assessment model.
- a model training module for using the social information of historical users as training samples; constructing a social relationship heterogeneous graph based on the training samples, and calculating the attention weight of the historical users Vector; input the attention weight vector into the convolutional neural network model for training to obtain the security assessment model.
- the model training module is further used to: input the attention weight vector of historical users into the neural network model, compare the output safety score with the actual safety score of the historical user; adjust the model parameters through a loss function The error between the security score output by the model and the actual security score of the historical user is minimized, and the security assessment model is finally obtained.
- the attention weight calculation module 302 further includes: a social relationship heterogeneous graph creation unit, configured to use targets that have social relationships with the target to be evaluated as neighbor nodes, and use social information between targets as Edges, constructing a heterogeneous graph of social relationships;
- the node attention weight calculation unit is used to calculate the node attention weight between different neighbor nodes and the target to be evaluated based on the social relationship heterogeneous graph;
- An edge attention weight calculation unit is used to calculate edge attention weights between the target to be evaluated and each neighbor node according to the node attention weight.
- the evaluation module 303 further includes: a node attention weight vector calculation unit, used to weight and sum the node attention weights to obtain a node attention weight vector;
- An edge attention weight vector calculation unit is used to perform a weighted sum of the edge attention weights to obtain an edge attention weight vector
- An evaluation unit is used to respectively input the node attention weight vector and the edge attention weight vector of the target to be evaluated into the security evaluation model to obtain the trust degree of the target to be evaluated.
- the service determination module 304 further includes: a trust threshold interval setting unit, used to set different trust threshold intervals; a service policy formulation unit, used to set corresponding trust threshold intervals for different trust levels. Service policy; a service determination unit, configured to provide a corresponding service policy according to the trust threshold interval in which the trust of the target to be evaluated is located.
- the device further includes an update module for regularly updating the training samples and updating the security assessment model according to the updated training samples.
- the information acquisition module 301 acquires different types of social information of the user.
- the attention weight calculation module 302 constructs a social relationship heterogeneous graph with different types of social relationships based on the social information, determines the attention weight corresponding to the target to be evaluated, and evaluates
- the module 303 calculates the attention weight vector according to the calculated attention weight, and inputs the preset security assessment model to calculate the trust degree of the target to be evaluated.
- the service determination module 304 calculates the trust degree based on the ratio of the evaluated trust degree and the trust degree trend policy. Based on the results, the service strategy of the target to be evaluated is determined and pushed. It solves the problem that user trust cannot be predicted through user characteristics or the prediction results are inaccurate when there is little user data. Based on the predicted user trust, response strategies can be made in a timely manner before providing services to users to avoid losses. Ensure the data security of the service.
- the electronic device includes a processor and a memory.
- the memory is used to store a computer executable program.
- the processor executes a program based on an A target service determination method for graphing neural networks.
- Electronic devices take the form of general-purpose computing devices. There can be one processor or multiple processors working together.
- the present invention also does not exclude distributed processing, that is, the processors can be dispersed in different physical devices.
- the electronic device of the present invention is not limited to a single entity, and can also be the sum of multiple physical devices.
- the memory stores computer-executable programs, typically machine-readable code.
- the computer-readable program can be executed by the processor, so that the electronic device can perform the method of the present invention, or at least part of the steps in the method.
- the memory includes volatile memory, such as a random access memory unit (RAM) and/or a cache memory unit, and may also be a non-volatile memory, such as a read-only memory unit (ROM).
- volatile memory such as a random access memory unit (RAM) and/or a cache memory unit
- ROM read-only memory unit
- the electronic device further includes an I/O interface, which is used for data exchange between the electronic device and external devices.
- the I/O interface may represent one or more of several types of bus structures, including a memory unit bus or memory unit controller, a peripheral bus, a graphics acceleration port, a processing unit, or using any of a variety of bus structures. local bus.
- the electronic device of the present invention may also include elements or components not shown in the above examples.
- some electronic devices also include display units such as display screens, and some electronic devices also include human-computer interaction components, such as buttons and keyboards.
- the electronic device can execute the computer-readable program in the memory to implement the method of the present invention or at least part of the steps of the method, it can be considered as an electronic device covered by the present invention.
- a computer-readable recording medium stores a computer-executable program.
- the computer-executable program When the computer-executable program is executed, the above-mentioned target service determination method based on heterogeneous graph neural network of the present invention is implemented.
- the computer-readable storage medium may include a data signal propagated in baseband or as part of a carrier wave carrying readable program code therein. Such propagated data signals may take many forms, including but not limited to electromagnetic signals, optical signals, or any suitable combination of the above.
- a readable storage medium may also be any readable medium other than a readable storage medium that can transmit, propagate, or transport the program for use by or in connection with an instruction execution system, apparatus, or device.
- Program code contained on a readable storage medium may be transmitted using any suitable medium, including but not limited to wireless, wired, optical cable, RF, etc., or any suitable combination of the above.
- the above-mentioned computer-readable medium carries one or more programs.
- the computer-readable medium realizes the following functions: obtain the social information of the target to be evaluated; and according to the social information Construct a heterogeneous social relationship graph with different types of social relationships, and determine the attention weight corresponding to the target to be evaluated; input the attention weight into a preset security assessment model to calculate the trust degree of the target to be evaluated.
- the present invention can be implemented by hardware capable of executing specific computer programs, such as the system of the present invention, and the electronic processing unit, server, client, etc. included in the system. Mobile phones, control units, processors, etc.
- the invention may also be implemented by computer software executing the method of the invention.
- the computer software for executing the method of the present invention is not limited to being executed by one or a specific hardware entity. It can also be implemented by unspecified hardware in a distributed manner, such as computer program execution. Some of the method steps can be performed on the mobile client, and other parts can be performed on smart tables, smart recognition pens, etc.
- the software product can be stored in a computer-readable storage medium (can be a CD-ROM, USB flash drive, mobile hard disk, etc.), or can be distributed on the network, as long as it can enable the electronic device to execute according to this method of invention.
- a computer-readable storage medium can be a CD-ROM, USB flash drive, mobile hard disk, etc.
- the present invention can be implemented in hardware, or in a software module running on one or more processors, or in a combination thereof.
- general data processing devices such as microprocessors or digital signal processors (DSP) may be used in practice to implement some or all functions of some or all components according to embodiments of the present invention.
- DSP digital signal processors
- the invention may also be implemented as an apparatus or apparatus program (eg, computer program and computer program product) for performing part or all of the methods described herein.
- Such a program implementing the present invention may be stored on a computer-readable medium, or may be in the form of one or more signals. Such signals may be downloaded from an Internet website, or provided on a carrier signal, or in any other form.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Human Resources & Organizations (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- Economics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- Tourism & Hospitality (AREA)
- General Health & Medical Sciences (AREA)
- Entrepreneurship & Innovation (AREA)
- Educational Administration (AREA)
- General Business, Economics & Management (AREA)
- Marketing (AREA)
- Development Economics (AREA)
- Artificial Intelligence (AREA)
- Biophysics (AREA)
- Quality & Reliability (AREA)
- Operations Research (AREA)
- Primary Health Care (AREA)
- Game Theory and Decision Science (AREA)
- Biomedical Technology (AREA)
- Life Sciences & Earth Sciences (AREA)
- Computational Linguistics (AREA)
- Data Mining & Analysis (AREA)
- Evolutionary Computation (AREA)
- Molecular Biology (AREA)
- General Engineering & Computer Science (AREA)
- Mathematical Physics (AREA)
- Software Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present invention relates to the technical field of computer information processing, and provides a heterogeneous graph neural network-based method and apparatus for determining a target service. The method comprises: obtaining social information of a target to be evaluated; constructing a social relationship heterogeneous graph according to the social information, and determining an attention weight corresponding to the target; and inputting the attention weight into a preset security assessment model to calculate a degree of credibility of the target. According to the present invention, a social relationship heterogeneous graph is constructed according to social information of a target to be evaluated, an attention weight corresponding to the target is calculated, an attention weight vector is inputted into a preset security assessment model to calculate a degree of credibility of the target, and a service policy is determined according to the degree of credibility. In the present solution, by using the degree of credibility obtained by means of the social relationship of the target, a response policy is promptly made for a service provider before providing a service, thereby preventing loss caused by mismatching the provided service, and guaranteeing the data security of the service.
Description
本发明属于计算机信息处理技术领域,更具体的是涉及一种基于异构图神经网络的目标服务确定方法、装置、电子设备和计算机可读介质。The invention belongs to the technical field of computer information processing, and more specifically relates to a target service determination method, device, electronic equipment and computer-readable medium based on heterogeneous graph neural network.
对于提供服务的机构而言,对服务使用方进行全面深入的分析,能够有助于为服务使用方提供更加优质的服务。但是,很多情况下,服务使用方提交的信息并不充分,特别是对于刚刚落地注册的服务使用方而言,服务机构仅能获知简单的使用方信息。在这种情况下,将分散在各地、各个机构的服务使用方数据进行整合就成为了一个重要趋势。For service providers, a comprehensive and in-depth analysis of service users can help provide better services to service users. However, in many cases, the information submitted by service users is insufficient, especially for service users who have just registered. The service agency can only obtain simple user information. In this case, it has become an important trend to integrate service user data scattered in various places and institutions.
在数据服务领域,存在数据不安全的特点,因此机构通常通过运用大量的历史样例数据对评分模型进行训练,训练生成评分模型,来判断待评估目标的信任度,但是当机构收集的信息较少时,如何确定所提供的服务的难度会变的非常大,预测结果不准确,而预测结果不准确,也很难制定出相匹配的服务策略。In the field of data services, data is insecure. Therefore, organizations usually use a large amount of historical sample data to train the scoring model and generate a scoring model through training to judge the trust of the target to be evaluated. However, when the information collected by the organization is relatively small, Over time, it will be very difficult to determine the services to be provided, and the prediction results will be inaccurate. If the prediction results are not accurate, it will also be difficult to formulate a matching service strategy.
发明内容Contents of the invention
(一)要解决的技术问题(1) Technical problems to be solved
本发明旨在解决如何在信息较少的情况下准确预测对待评估目标的信任度的技术问题。The present invention aims to solve the technical problem of how to accurately predict the trust degree of a target to be evaluated when there is less information.
(二)技术方案(2) Technical solutions
为解决上述技术问题,本发明的一方面提出一种基于异构图神经网络的目标服务确定方法,包括:In order to solve the above technical problems, one aspect of the present invention proposes a target service determination method based on heterogeneous graph neural network, including:
获取待评估目标的社交信息;Obtain social information of the target to be evaluated;
根据所述社交信息构建具有不同类型社交关系的社交关系异构图,确定与所述待评估目标对应的注意力权重;
Construct a heterogeneous social relationship graph with different types of social relationships based on the social information, and determine the attention weight corresponding to the target to be evaluated;
将所述注意力权重输入预设的安全评估模型计算所述待评估目标的信任度;Input the attention weight into a preset security evaluation model to calculate the trust degree of the target to be evaluated;
基于所述信任度与所述信任度趋势策略的比对结果,确定所述待评估目标的服务策略并进行推送。Based on the comparison result between the trust degree and the trust degree trend policy, the service policy of the target to be evaluated is determined and pushed.
根据本发明的优选实施方式,所述根据所述社交信息构建具有不同类型社交关系的社交关系异构图,确定与所述待评估目标对应的注意力权重,进一步包括:According to a preferred embodiment of the present invention, constructing a heterogeneous social relationship graph with different types of social relationships based on the social information and determining the attention weight corresponding to the target to be evaluated further includes:
将与所述待评估目标存在社交关系的目标作为邻居节点,将目标间的社交信息作为边,构建社交关系异构图;Use the targets that have a social relationship with the target to be evaluated as neighbor nodes, and use the social information between the targets as edges to construct a heterogeneous graph of social relationships;
根据社交关系异构图计算不同邻居节点与待评估目标间的节点注意力权重;Calculate the node attention weights between different neighbor nodes and the target to be evaluated based on the heterogeneous social relationship graph;
根据所述节点注意力权重计算待评估目标与各个邻居节点之间的边注意力权重。Calculate the edge attention weight between the target to be evaluated and each neighbor node according to the node attention weight.
根据本发明的优选实施方式,将所述注意力权重输入预设的安全评估模型计算所述待评估目标的信任度,进一步包括:According to a preferred embodiment of the present invention, inputting the attention weight into a preset security evaluation model to calculate the trust degree of the target to be evaluated further includes:
对所述节点注意力权重加权求和得到节点注意力权重向量;Perform a weighted sum of the node attention weights to obtain a node attention weight vector;
对所述边注意力权重加权求和得到边注意力权重向量;A weighted sum of the edge attention weights is used to obtain an edge attention weight vector;
将待评估目标的节点注意力权重向量和边注意力权重向量分别输入安全评估模型得到所述待评估目标的信任度。The node attention weight vector and edge attention weight vector of the target to be evaluated are respectively input into the security evaluation model to obtain the trust degree of the target to be evaluated.
根据本发明的优选实施方式,所述信任度趋势策略的比对结果,确定所述待评估目标的服务策略并进行推送进一步包括:According to a preferred embodiment of the present invention, determining the service strategy of the target to be evaluated based on the comparison result of the trust trend strategy and pushing it further includes:
设定不同的信任度阈值区间;Set different trust threshold intervals;
对不同的信任度阈值区间设置对应的服务策略;Set corresponding service policies for different trust threshold intervals;
根据所述待评估目标的信任度所在的信任度阈值区间提供对应的服务策略。A corresponding service policy is provided according to the trust threshold interval in which the trust level of the target to be evaluated is located.
根据本发明的优选实施方式,所述获取待评估目标的社交信息进一步包括:According to a preferred embodiment of the present invention, obtaining the social information of the target to be evaluated further includes:
获取待评估目标的社交关系信息,包括通话信息、通讯录信息及地理位置信息。
Obtain the social relationship information of the target to be evaluated, including call information, address book information and geographical location information.
根据本发明的优选实施方式,在根据所述社交信息构建具有不同类型社交关系的社交关系异构图,确定与所述待评估目标对应的注意力权重前,所述方法还包括:According to a preferred embodiment of the present invention, before constructing a social relationship heterogeneous graph with different types of social relationships based on the social information and determining the attention weight corresponding to the target to be evaluated, the method further includes:
将历史用户的社交信息作为训练样本;Use social information of historical users as training samples;
根据所述训练样本构建社交关系异构图,计算得到所述历史用户的注意力权重向量;Construct a heterogeneous social relationship graph based on the training samples, and calculate the attention weight vector of the historical users;
将所述注意力权重向量输入卷积神经网络模型进行训练,得到所述安全评估模型。The attention weight vector is input into the convolutional neural network model for training to obtain the security assessment model.
根据本发明的优选实施方式,所述将所述注意力权重向量输入卷积神经网络模型进行训练,得到所述安全评估模型,进一步包括:According to a preferred embodiment of the present invention, inputting the attention weight vector into a convolutional neural network model for training to obtain the security assessment model further includes:
将历史用户的注意力权重向量输入神经网络模型,输出的安全评分与所述历史用户实际的安全评分进行比较;Input the attention weight vector of historical users into the neural network model, and compare the output safety score with the actual safety score of the historical user;
通过损失函数调整模型参数使得模型输出的安全评分与所述历史用户实际的安全评分误差最小,最终得到所述安全评估模型。The model parameters are adjusted through the loss function to minimize the error between the security score output by the model and the actual security score of the historical users, and finally the security assessment model is obtained.
根据本发明的优选实施方式,所述方法还包括:According to a preferred embodiment of the present invention, the method further includes:
定期更新所述训练样本,并根据更新后的训练样本更新所述安全评估模型。The training samples are regularly updated, and the security assessment model is updated based on the updated training samples.
本发明第二方面提出一种基于异构图神经网络的目标服务确定装置,包括:A second aspect of the present invention proposes a target service determination device based on a heterogeneous graph neural network, including:
信息获取模块,用于获取待评估目标的社交信息;Information acquisition module, used to obtain social information of the target to be evaluated;
注意力权重计算模块,用于根据所述社交信息构建具有不同类型社交关系的社交关系异构图,确定与所述待评估目标对应的注意力权重;An attention weight calculation module, configured to construct a heterogeneous social relationship graph with different types of social relationships based on the social information, and determine the attention weight corresponding to the target to be evaluated;
评估模块,用于将所述注意力权重输入预设的安全评估模型计算所述待评估目标的信任度;An evaluation module, configured to input the attention weight into a preset security evaluation model to calculate the trust degree of the target to be evaluated;
服务确定模块,用于基于所述信任度与所述信任度趋势策略的比对结果,确定所述待评估目标的服务策略并进行推送。A service determination module, configured to determine and push the service policy of the target to be evaluated based on the comparison result between the trust degree and the trust degree trend policy.
根据本发明的优选实施方式,所述注意力权重计算模块进一步包括:According to a preferred embodiment of the present invention, the attention weight calculation module further includes:
社交关系异构图创建单元,用于将与所述待评估目标存在社交关系的目标作为邻居节点,将目标间的社交信息作为边,构建社交关系异构图;
A social relationship heterogeneous graph creation unit is used to construct a social relationship heterogeneous graph using targets that have a social relationship with the target to be evaluated as neighbor nodes and social information between targets as edges;
节点注意力权重计算单元,用于根据社交关系异构图计算不同邻居节点与待评估目标间的节点注意力权重;The node attention weight calculation unit is used to calculate the node attention weight between different neighbor nodes and the target to be evaluated based on the social relationship heterogeneous graph;
边注意力权重计算单元,用于根据所述节点注意力权重计算待评估目标与各个邻居节点之间的边注意力权重。An edge attention weight calculation unit is used to calculate edge attention weights between the target to be evaluated and each neighbor node according to the node attention weight.
根据本发明的优选实施方式,所述评估模块进一步包括:According to a preferred embodiment of the present invention, the evaluation module further includes:
节点注意力权重向量计算单元,用于对所述节点注意力权重加权求和得到节点注意力权重向量;A node attention weight vector calculation unit is used to perform a weighted sum of the node attention weights to obtain a node attention weight vector;
边注意力权重向量计算单元,用于对所述边注意力权重加权求和得到边注意力权重向量;An edge attention weight vector calculation unit is used to perform a weighted sum of the edge attention weights to obtain an edge attention weight vector;
评估单元,用于将待评估目标的节点注意力权重向量和边注意力权重向量分别输入安全评估模型得到所述待评估目标的信任度。An evaluation unit is used to respectively input the node attention weight vector and the edge attention weight vector of the target to be evaluated into the security evaluation model to obtain the trust degree of the target to be evaluated.
本发明第三方面提出一种电子设备,包括处理器和存储器,所述存储器用于存储计算机可执行程序,当所述计算机程序被所述处理器执行时,所述处理器执行所述的方法。A third aspect of the present invention proposes an electronic device, including a processor and a memory. The memory is used to store a computer executable program. When the computer program is executed by the processor, the processor executes the method. .
本发明第四方面还提出一种计算机可读介质,存储有计算机可执行程序,所述计算机可执行程序被执行时,实现所述的方法。A fourth aspect of the present invention also provides a computer-readable medium that stores a computer-executable program. When the computer-executable program is executed, the method is implemented.
本发明通过获取待评估目标的社交信息,根据所述社交信息构建具有不同类型社交关系的社交关系异构图,确定与待评估目标对应的注意力权重,并将注意力权重向量输入预设的安全评估模型计算所述待评估目标的信任度,在本方案中通过待评估目标的社交关系得到的信任度,为服务提供方在提供服务前及时做出应对策略,避免因提供的服务不匹配导致的损失,保障服务的数据安全。This invention obtains the social information of the target to be evaluated, builds a heterogeneous social relationship graph with different types of social relationships based on the social information, determines the attention weight corresponding to the target to be evaluated, and inputs the attention weight vector into the preset The security assessment model calculates the trust degree of the target to be evaluated. In this solution, the trust degree obtained through the social relationship of the target to be evaluated allows the service provider to make timely response strategies before providing services to avoid mismatches in the provided services. loss caused and ensure the data security of the service.
图1是本发明一个实施例的一种基于异构图神经网络的目标服务确定方法及装置的系统框图;Figure 1 is a system block diagram of a target service determination method and device based on a heterogeneous graph neural network according to an embodiment of the present invention;
图2是本发明一个实施例的一种基于异构图神经网络的目标服务确定方法流程示意图;
Figure 2 is a schematic flow chart of a method for determining target services based on heterogeneous graph neural networks according to one embodiment of the present invention;
图3是本发明一个实施例的一种基于异构图神经网络的目标服务确定装置示意图。Figure 3 is a schematic diagram of a target service determination device based on a heterogeneous graph neural network according to an embodiment of the present invention.
在对于具体实施例的介绍过程中,对结构、性能、效果或者其他特征的细节描述是为了使本领域的技术人员对实施例能够充分理解。但是,并不排除本领域技术人员可以在特定情况下,以不含有上述结构、性能、效果或者其他特征的技术方案来实施本发明。During the introduction of specific embodiments, the detailed description of the structure, performance, effects or other features is to enable those skilled in the art to fully understand the embodiments. However, this does not exclude those skilled in the art from being able to implement the present invention under specific circumstances with technical solutions that do not contain the above-mentioned structures, performances, effects or other features.
各附图中相同的附图标记表示相同或类似的元件、组件或部分,因而下文中可能省略了对相同或类似的元件、组件或部分的重复描述。还应理解,虽然本文中可能使用第一、第二、第三等表示编号的定语来描述各种器件、元件、组件或部分,但是这些器件、元件、组件或部分不应受这些定语的限制。也就是说,这些定语仅是用来将一者与另一者区分。例如,第一器件亦可称为第二器件,但不偏离本发明实质的技术方案。此外,术语“和/或”、“及/或”是指包括所列出项目中的任一个或多个的所有组合。The same reference numerals in the various drawings represent the same or similar elements, components or parts, and thus repeated descriptions of the same or similar elements, components or parts may be omitted below. It should also be understood that, although the attributive terms first, second, third, etc. indicating numbering may be used herein to describe various devices, elements, components or portions, these devices, elements, components or portions should not be limited by these attributions. . In other words, these attributives are only used to distinguish one from the other. For example, the first device may also be called a second device, without departing from the essential technical solution of the present invention. Furthermore, the terms "and/or" and "and/or" are intended to include all combinations of any one or more of the listed items.
本发明提出一种基于异构图神经网络的目标服务确定方法,通过将待识别目标的社交信息构建社交关系异构图,从节点维度和视图维度计算对应的注意力权重,最后将注意力权重向量输入训练好的分类模型计算得到该用户的信任度。The present invention proposes a target service determination method based on a heterogeneous graph neural network. By constructing a social relationship heterogeneous graph with the social information of the target to be identified, the corresponding attention weight is calculated from the node dimension and the view dimension, and finally the attention weight is The vector inputs the trained classification model to calculate the trust level of the user.
为使本发明的目的、技术方案和优点更加清楚明白,以下结合具体实施例,并参照附图,对本发明作进一步的详细说明。In order to make the purpose, technical solutions and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with specific embodiments and with reference to the accompanying drawings.
图1是根据一示例性实施例示出的一种基于异构图神经网络的目标服务确定方法及装置的系统框图。Figure 1 is a system block diagram of a target service determination method and device based on a heterogeneous graph neural network according to an exemplary embodiment.
如图1所示,系统架构100可以包括用户终端101、102、103中的一种或多种,网络104和服务器105。网络104用以在用户终端101、102、103和服务器105之间提供通信链路的介质。网络104可以包括各种连接类型,例如有线、无线通信链路或者光纤电缆等等。As shown in Figure 1, the system architecture 100 may include one or more of user terminals 101, 102, 103, a network 104 and a server 105. Network 104 is a medium used to provide communication links between user terminals 101, 102, 103 and server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
应该理解,图1中的用户终端、网络和服务器的数目仅仅是示意性的。根据实现需要,可以具有任意数目的用户终端、网络和服务器。比如服务器105可以是多个服务器组成的服务器集群等。
It should be understood that the number of user terminals, networks and servers in Figure 1 is only illustrative. Depending on implementation needs, there can be any number of user terminals, networks, and servers. For example, the server 105 may be a server cluster composed of multiple servers.
用户可以使用用户终端101、102、103通过网络104与服务器105交互,以接收或发送消息等。用户终端101、102、103可以是具有显示屏的各种电子设备,包括但不限于智能手机、平板电脑、便携式计算机和台式计算机等等。Users can use user terminals 101, 102, 103 to interact with the server 105 through the network 104 to receive or send messages, etc. The user terminals 101, 102, and 103 may be various electronic devices with display screens, including but not limited to smart phones, tablet computers, portable computers, desktop computers, and so on.
在一些实施例中,本发明实施例所提供的设备安全等级识别方法一般由服务器105执行,相应地,设备安全等级识别装置一般设置于服务器105中。在另一些实施例中,某些终端可以具有与服务器相似的功能从而执行本方法。因此,本发明实施例所提供的设备安全等级识别方法不限定在服务器端执行。In some embodiments, the device security level identification method provided by the embodiment of the present invention is generally executed by the server 105. Correspondingly, the device security level identification device is generally provided in the server 105. In other embodiments, some terminals may have functions similar to those of the server to perform this method. Therefore, the device security level identification method provided by the embodiment of the present invention is not limited to being executed on the server side.
图2是本发明一个是实施例的一种基于异构图神经网络的目标服务确定方法流程示意图。Figure 2 is a schematic flowchart of a method for determining target services based on heterogeneous graph neural networks according to one embodiment of the present invention.
如图2所示,本方法包括:As shown in Figure 2, this method includes:
S201、获取待评估目标的社交信息。S201. Obtain social information of the target to be evaluated.
在本实施例中,待评估目标可为个人用户或者企业用户,其中,在待评估目标为个人用户时,社交信息可包括经过用户授权的基础信息,例如,基础信息可以是通话信息、电话通讯录信息、社交软件通讯录、用户所处地域信息、交易信息、交互信息等;社交信息还可包括行为信息,例如,行为信息可以是用户之间的交易信息、用户之间的交流信息等;在待评估目标为企业用户时,社交信息可以是企业之间的股权穿透信息、企业之间的新闻信息、企业内管理人员的社交信息等等;社交信息的具体内容可根据实际应用场景确定,在此不做限制。In this embodiment, the target to be evaluated may be an individual user or an enterprise user. When the target to be evaluated is an individual user, the social information may include basic information authorized by the user. For example, the basic information may be call information, telephone communication Directory information, social software address book, user location information, transaction information, interactive information, etc.; social information can also include behavioral information. For example, behavioral information can be transaction information between users, communication information between users, etc.; When the target to be evaluated is an enterprise user, the social information can be equity penetration information between enterprises, news information between enterprises, social information of managers within the enterprise, etc.; the specific content of the social information can be determined according to the actual application scenario. , there is no restriction here.
在一个具体的应用中,待识别的节点可为用户,社交信息为该用户和其他用户之间的交互信息,交互信息可包括:互联网上进行过互动,在同一地理位置同时出现并同行,共用过同一硬件设备等等。通过是否有交互来确定用户之间是否有关联,然后再依据本申请中的方法生成该用的关联用户,进而再根据关联用户的行为(比如,是否存在违规行为,是否存在不良记录等等)来确定该关联用户是不是会影响到用户信息安全的可疑人员。
In a specific application, the node to be identified can be a user, and the social information is the interaction information between the user and other users. The interaction information can include: interactions on the Internet, appearing together in the same geographical location at the same time, sharing through the same hardware device, etc. Determine whether there is an association between users by whether there is interaction, and then generate the associated user according to the method in this application, and then based on the behavior of the associated user (for example, whether there are violations, whether there are bad records, etc.) To determine whether the associated user is a suspicious person who will affect the security of user information.
在本申请实施例中,待识别节点还可以是终端设备或者服务器,其中,社交信息可以是终端设备或服务器中数据交互信息、数据传输信息、设备状态信息等等。In this embodiment of the present application, the node to be identified may also be a terminal device or a server, where the social information may be data interaction information, data transmission information, device status information, etc. in the terminal device or server.
在一个具体的应用中,待识别的节点可为终端设备,社交信息可为与该终端设备有过数据传输的其他终端,或者是和该终端设备处在同一网段内的其他终端,还可以是和该终端设备处于同一公司名下的其他终端。可通过终端设备之间是否有传输过数据、终端设备之间是否有物理连接关系,来确定该终端设备的关联终端。In a specific application, the node to be identified can be a terminal device, and the social information can be other terminals that have had data transmission with the terminal device, or other terminals in the same network segment as the terminal device, or It is another terminal under the same company name as the terminal device. The associated terminal of the terminal device can be determined by whether data has been transmitted between the terminal devices and whether there is a physical connection relationship between the terminal devices.
在本实施例中,社交信息可以是用户使用的终端设备或社交账号之间的关注信息或者交流信息;或者不同目标之间的交易信息;或者,在用户授权的情况下获取的设备内存储的通讯记录和联系人信息;亦或者,从视频数据中采集的用户之间的交流信息;也可以是,企业内员工的岗位信息或者员工所属的部门信息等等。In this embodiment, social information can be attention information or communication information between terminal devices or social accounts used by users; or transaction information between different targets; or, information stored in the device obtained with user authorization. Communication records and contact information; or communication information between users collected from video data; or information about the positions of employees within the company or the department information to which the employees belong, etc.
在本方案中,以所述待评估目标为用户进行举例,在用户授权的情况下首先获取待评估目标的社交信息,社交信息可以包括交易信息、通话信息、互联网上进行过互动,在同一地理位置同时出现并同行,共用过同一硬件设备等等等,上述社交情况可以是使用通信设备的用户在互联网服务平台公开的数据,在本实施例中,社交关联可以是暂时性关联,比如,某一天与该用户存在通话关系的用户,或者地理位置相近;也可以是长久性关联,比如家庭关联,电话通讯录中的用户,工作单位关联等等,在此不做具体限制。可以采用对用户信息中可以识别出用户身份的信息删除或者匿名化处理的方式来实现对于用户隐私的保护,匿名化处理可以是通过加密手段对数据进行处理。In this solution, the target to be evaluated is used as an example. With the user's authorization, the social information of the target to be evaluated is first obtained. The social information can include transaction information, call information, interactions on the Internet, and people in the same geographical location. The locations appear and go together at the same time, the same hardware device has been shared, etc. The above social situation can be data disclosed by users using communication devices on the Internet service platform. In this embodiment, the social association can be a temporary association, such as a certain Users who have had a phone call relationship with the user for one day, or are geographically close; it can also be a permanent association, such as family association, users in the phone address book, work unit association, etc. There are no specific restrictions here. The protection of user privacy can be achieved by deleting or anonymizing information in user information that can identify the user's identity. Anonymization can process data through encryption.
在本方案中,由于居住相近的用户之间可能存在社交关联,所以,可以获取与待评估目标地理位置相近的历史用户,例如与该用户所在地距离小于一千米之内,或者居住在同一小区的历史用户。In this solution, since there may be social connections between users who live close to each other, it is possible to obtain historical users who are geographically close to the target to be evaluated, for example, within a kilometer of the user's location, or who live in the same community. historical users.
S202、根据所述社交信息构建具有不同类型社交关系的社交关系异构图,确定与所述待评估目标对应的注意力权重。S202. Construct a social relationship heterogeneous graph with different types of social relationships based on the social information, and determine the attention weight corresponding to the target to be evaluated.
对于安全评估模型,在本发明实施例中是通过大量的历史样本数据训练得出的,在本实施例中,在根据所述社交信息构建具有不同类型社交关系的社交关系异构图,确定与所述待评估目标对应的注意力权重前,首先获取大量历史用户的用户信息,并获取每个历史用户的社交信息作为训练样本,根据训练样本构建社交关系异构图,计算得到所述历史用户的注意力权重向量,由于历史用户的安全情况是已知的,将已知的安全情况作为标签,将这些训练样本得到的注意力权重向量输入模型进行训练,输出的安全评分与所述历史用户实际的安全评分进行比较,通过损失函数调整模型参数使得模型输出的安全评分与历史用户实际的安全评分误差最小,最终得到安全评估模型,本发明实施例中使用的模型包括但不限于卷积神经网络模型。For the security assessment model, in the embodiment of the present invention, it is obtained through training with a large number of historical sample data. In this embodiment, after constructing a social relationship heterogeneous graph with different types of social relationships based on the social information, it is determined with Before the attention weight corresponding to the target to be evaluated, user information of a large number of historical users is first obtained, and the social information of each historical user is obtained as a training sample, a social relationship heterogeneous graph is constructed based on the training sample, and the historical users are calculated The attention weight vector, since the security situation of historical users is known, use the known safety situation as a label, input the attention weight vector obtained from these training samples into the model for training, and the output security score is consistent with the historical user Compare the actual safety scores, and adjust the model parameters through the loss function to minimize the error between the safety scores output by the model and the actual safety scores of historical users, and finally obtain a safety assessment model. The models used in the embodiments of the present invention include but are not limited to convolutional neural networks. network model.
在一些实施例中,在获取到待评估目标的社交信息后,根据社交信息构建社交关系异构图,其中以待评估目标的手机号作为待评估用户,分别将与待评估目标存在社交关系的每个用户作为一个邻居节点,将用户间对应的社交关系分别作为边构建社交关系异构图。社交关系可分为不同类型,例如通话关系、通讯录关系、地理位置关系等。In some embodiments, after obtaining the social information of the target to be evaluated, a social relationship heterogeneous graph is constructed based on the social information, in which the mobile phone number of the target to be evaluated is used as the user to be evaluated, and the users who have a social relationship with the target to be evaluated are respectively Each user serves as a neighbor node, and the corresponding social relationships between users are used as edges to construct a heterogeneous social relationship graph. Social relationships can be divided into different types, such as call relationships, address book relationships, geographical location relationships, etc.
本发明通过节点维度和视图维度两方面来计算待评估目标的注意力权重。This invention calculates the attention weight of the target to be evaluated through two aspects: node dimensions and view dimensions.
1)节点维度:利用如下公式计算节点维度的注意力权重:1) Node dimension: Use the following formula to calculate the attention weight of the node dimension:
k包含于
k is included in
其中u表示待评估用户,i表示邻居节点,表示当前社交关系异构图下邻居节点i的特征向量,表示当前社交关系异构图下需要学习的邻居节点i的注意力向量,表示当前社交关系异构图下待评估用户u的邻居节点集合,表示当前社交关系异构图下邻居节点k的特征向量,表示当前社交关系异构图下需要学习的邻居节点k的注意力向量。where u represents the user to be evaluated, i represents the neighbor node, Represents the feature vector of neighbor node i under the current social relationship heterogeneous graph, Represents the attention vector of neighbor node i that needs to be learned under the current social relationship heterogeneous graph, Represents the set of neighbor nodes of user u to be evaluated under the current social relationship heterogeneous graph, Represents the feature vector of neighbor node k under the current social relationship heterogeneous graph, Represents the attention vector of neighbor node k that needs to be learned under the current social relationship heterogeneous graph.
表示的注意力向量为待评估用户与邻居节点i之间的社交关系构成的向量;进一步,还可以根据社交关系对应的评分构成向量,比如,待评估用户与邻居节点之间可能存在多种不同的社交关系,在本方案中可以对不同的社交关系分别给定相应的分数,或者,通过设置一个打分函数,来对各个不同的社交关系进行打分,将各种不同的社交关系对应的分数组成注意力向量。
The attention vector represented is a vector composed of the social relationship between the user to be evaluated and the neighbor node i; further, the vector can also be formed according to the score corresponding to the social relationship. For example, there may be many differences between the user to be evaluated and the neighbor node In this solution, corresponding scores can be given to different social relationships, or a scoring function can be set to score each different social relationship, and the scores corresponding to various social relationships can be composed of attention vector.
对计算得到的注意力权重αui进行归一化处理。The calculated attention weight α ui is normalized.
在得到待评估用户的注意力系数后,与周围邻居节点特征进行加权求和,得到待评估用户的节点注意力权重向量,用如下公式表示:After obtaining the attention coefficient of the user to be evaluated, perform a weighted summation with the surrounding neighbor node features to obtain the node attention weight vector of the user to be evaluated, expressed by the following formula:
k包含于
k is included in
其中,αuk表示待评估用户与邻居节点k的注意力权重,euk表示待评估用户的邻居节点k的特征向量。Among them, α uk represents the attention weight between the user to be evaluated and neighbor node k, and e uk represents the feature vector of neighbor node k of the user to be evaluated.
节点维度用户比较同一种用户社交关系间邻居节点与待评估用户间的影响力,例如用户通话信息中的邻居节点进行比较,用户通讯录信息中的邻居节点进行比较,用户地理位置附近的邻居节点进行比较。In the node dimension, users compare the influence between neighbor nodes of the same user social relationship and the user to be evaluated, such as comparing neighbor nodes in the user's call information, comparing neighbor nodes in the user's address book information, and comparing neighbor nodes near the user's geographical location. Compare.
2)视图维度:2) View dimensions:
根据所述节点注意力权重计算与待评估用户社交关系不同的边注意力权重。将节点注意力权重向量输入神经网络的全连接层
Calculate edge attention weights that are different from the social relationship of the user to be evaluated based on the node attention weights. Input the node attention weight vector into the fully connected layer of the neural network
Calculate edge attention weights that are different from the social relationship of the user to be evaluated based on the node attention weights. Input the node attention weight vector into the fully connected layer of the neural network
其中,ReLU为线性整流函数,为节点注意力权重向量,wi为邻居节点i的特征;b为偏置项,初始值为预设常数;通过线性整流函数对前连接层的函数进行整流,得到节点注意力权重向量。Among them, ReLU is the linear rectification function, is the node attention weight vector, wi is the characteristic of neighbor node i; b is the bias term, and the initial value is a preset constant; the function of the front connection layer is rectified through a linear rectification function to obtain the node attention weight vector.
然后计算边注意力权重系数:计算方法与计算节点注意力系数相同,最后进行加权求和,并对每个视图进行拼接得到最终的边注意力权重向量:k包含于
Then calculate the edge attention weight coefficient: The calculation method is the same as calculating the node attention coefficient. Finally, a weighted sum is performed, and each view is spliced to obtain the final edge attention weight vector: k is included in
其中,为待评估目标与邻居节点i的边的边注意力权重,为节点注意力权重向量中第i个元素,为待评估目标与邻居节点i的边的特征向量,为节点注意力权重向量中第k个元素,为待评估目标与邻居节点k的边的特征向量,表示待评估用户与邻居节点k的边的边注意力权重,为节点注意力权重向量中第k个元素,concat表示合并函数。in, is the edge attention weight of the edge between the target to be evaluated and neighbor node i, is the i-th element in the node attention weight vector, is the feature vector of the edge between the target to be evaluated and neighbor node i, is the k-th element in the node attention weight vector, is the feature vector of the edge between the target to be evaluated and neighbor node k, Represents the edge attention weight of the edge between the user to be evaluated and neighbor node k, is the k-th element in the node attention weight vector, and concat represents the merging function.
视图维度用户比较不同用户社交关系间节点的影响力,例如比较用户通话信息的节点与用户通讯录节点对于待评估目标的影响力,或者比较用户通讯录信息节点与用户地理位置附近的节点对于待评估目标的影响力等。View dimension users compare the influence of nodes between different users' social relationships, for example, compare the influence of users' call information nodes and users' address book nodes on the target to be evaluated, or compare the influence of users' address book information nodes and nodes near the user's geographical location on the target to be evaluated. Evaluate the impact of your goals, etc.
在本实施例中,在计算得到各个邻居节点与待评估用户之间的边注意力权重后,可以将具有相同类型的社交关系的邻居节点与待评估用户之间的边注意力权重汇总,得到该类型社交关系的节点的平均边注意力权重,将该平均边注意力权重作为该类型社交关系的各个邻居节点与待评估用户的边注意力权重,降低因为单个目标的过度关注对于计算的影响,通过本步骤,可以得到待评估用户对于不同种类社交关系的目标的平均关注度,从宏观观察待评估用户用户对于不同社交关系的目标的注意力,降低因为单个目标的过度关注对于总体的影响,提高预测精准性。其中,汇总的方式可以采用均值计算、调和平均、加权平均等等。再进一步,可以确定具有同类型社交关系的节点与待评估用户之间的边注意力权重的方差或者波动性,根据方差或波动性可以有效的确定待评估用户对于该类型社交关系的节点的注意力,即可以确定不同类型社交关系的节点对于待评估用户的影响。In this embodiment, after calculating the edge attention weights between each neighbor node and the user to be evaluated, the edge attention weights between neighbor nodes with the same type of social relationship and the user to be evaluated can be summarized to obtain The average edge attention weight of nodes of this type of social relationship is used as the edge attention weight of each neighbor node of this type of social relationship and the user to be evaluated to reduce the impact of excessive attention on a single target on calculations , through this step, the average degree of attention of the users to be evaluated to the goals of different types of social relationships can be obtained. From a macro perspective, the attention of the users to be evaluated to the goals of different social relationships can be obtained, and the overall impact of excessive attention to a single target can be reduced. , improve prediction accuracy. Among them, the summary method can adopt mean calculation, harmonic average, weighted average, etc. Furthermore, the variance or volatility of the edge attention weights between nodes with the same type of social relationship and the user to be evaluated can be determined. Based on the variance or volatility, the attention of the user to be evaluated to the node with this type of social relationship can be effectively determined. Power, that is, to determine the impact of nodes with different types of social relationships on the users to be evaluated.
S203、将所述注意力权重输入预设的安全评估模型计算所述待评估目标的信任度。S203. Enter the attention weight into a preset security assessment model to calculate the trust degree of the target to be assessed.
将注意力权重系数加权求和后得到的待评估目标的节点注意力权重向量和边注意力权重向量分别输入上述实施例中训练得到的安全评估模型,分别得到同种社交关系间待评估目标的信任度,以及不同社交关系间待评估目标的信任度,最后经过不同策略综合评估得到该用户的信任度。The node attention weight vector and edge attention weight vector of the target to be evaluated, which are obtained by the weighted sum of the attention weight coefficients, are respectively input into the security assessment model trained in the above embodiment, and the values of the targets to be evaluated between the same social relationships are obtained. Trust, as well as the trust of the target to be evaluated between different social relationships, and finally the user's trust is obtained through comprehensive evaluation using different strategies.
优选的,为了确保文本分类模型输出的结果的准确度,需要定期更新训练样本,选择时间较近的训练样本,统计样本的信任度,并根据更新后的样本训练安全评估模型,对安全评估模型参数进行更新。Preferably, in order to ensure the accuracy of the results output by the text classification model, it is necessary to regularly update the training samples, select training samples that are relatively recent, count the trust of the samples, and train the security assessment model based on the updated samples, and evaluate the security assessment model. parameters are updated.
本发明通过获取待评估目标的社交信息,根据所述社交信息构建具有不同类型社交关系的社交关系异构图,确定与待评估目标对应的注意力权重,并将注意力权重向量输入预设的安全评估模型计算所述待评估目标的信任度,解决了在用户数据较少的情况下,无法通过用户特征预测出用户信任度或预测结果不准确的问题,根据预测的用户的信任度在对用户进行服务前及时做出应对策略,避免损失,提高服务安全。
This invention obtains the social information of the target to be evaluated, builds a heterogeneous social relationship graph with different types of social relationships based on the social information, determines the attention weight corresponding to the target to be evaluated, and inputs the attention weight vector into the preset The security assessment model calculates the trust of the target to be evaluated, which solves the problem that user trust cannot be predicted through user characteristics or the prediction results are inaccurate when there is little user data. Users should make timely response strategies before performing services to avoid losses and improve service security.
S204、基于所述信任度与所述信任度趋势策略的比对结果,确定所述待评估目标的服务策略并进行推送。S204. Based on the comparison result between the trust degree and the trust degree trend policy, determine the service policy of the target to be evaluated and push it.
可例如,信任度趋势策略可以是预设信任度阈值,由大量历史用户的用户数据中提取针对该目标的统计分析值,以生成多个预设信任度区间。为不同的信任度区间制定不同的服务策略;信任度趋势策略也可以根据信任度随时间变化的变化趋势来设定信任度阈值,比如,可以设置多个不同的基准信任度阈值和一个单位信任度阈值,当社交关系随时间变化的变化趋势是待识别目标的信任度逐渐降低时,根据信任度变化趋势生成变化曲线,对变化曲线求导得到降低率,将多个不同的基准信任度阈值减去降低率乘以单位信任度阈值,得到当前信任度变化趋势对应的信任度阈值,根据得到的多个信任度阈值来确定最终的服务策略。同理,当信任度随时间变化的变化趋势是信任度逐渐增长时,将基准信任度阈值加上增长率乘以单位信任度阈值,根据得到的多个信任度阈值来确定最终的服务策略,最终可以在信任度的变化趋势不同的情况下设定不同的信任度阈值,以提高推送的服务的准确性。For example, the trust trend strategy can be a preset trust threshold, and the statistical analysis value for the target is extracted from the user data of a large number of historical users to generate multiple preset trust intervals. Develop different service strategies for different trust intervals; the trust trend strategy can also set trust thresholds based on the trend of changes in trust over time. For example, you can set multiple different baseline trust thresholds and a unit trust degree threshold. When the change trend of social relationships over time is that the trust degree of the target to be identified gradually decreases, a change curve is generated based on the trust degree change trend, and the change curve is derived to obtain the reduction rate. Multiple different baseline trust degree thresholds are Subtract the reduction rate multiplied by the unit trust threshold to obtain the trust threshold corresponding to the current trust change trend, and determine the final service strategy based on the multiple trust thresholds obtained. In the same way, when the trend of trust over time is that trust gradually increases, the base trust threshold plus the growth rate multiplied by the unit trust threshold are used to determine the final service strategy based on the multiple trust thresholds obtained. Ultimately, different trust thresholds can be set under different trust trends to improve the accuracy of pushed services.
本领域技术人员可以理解,实现上述实施例的全部或部分步骤被实现为由计算机数据处理设备执行的程序(计算机程序)。在该计算机程序被执行时,可以实现本发明提供的上述方法。而且,所述的计算机程序可以存储于计算机可读存储介质中,该存储介质可以是磁盘、光盘、ROM、RAM等可读存储介质,也可以是多个存储介质组成的存储阵列,例如磁盘或磁带存储阵列。所述的存储介质不限于集中式存储,其也可以是分布式存储,例如基于云计算的云存储。Those skilled in the art will understand that all or part of the steps to implement the above-described embodiments are implemented as programs (computer programs) executed by computer data processing equipment. When the computer program is executed, the above method provided by the present invention can be implemented. Moreover, the computer program can be stored in a computer-readable storage medium. The storage medium can be a readable storage medium such as a magnetic disk, an optical disk, a ROM, or a RAM, or it can be a storage array composed of multiple storage media, such as a magnetic disk or a storage medium. Tape storage array. The storage medium is not limited to centralized storage, it can also be distributed storage, such as cloud storage based on cloud computing.
下面描述本发明的装置实施例,该装置可以用于执行本发明的方法实施例。对于本发明装置实施例中描述的细节,应视为对于上述方法实施例的补充;对于在本发明装置实施例中未披露的细节,可以参照上述方法实施例来实现。The following describes a device embodiment of the present invention, which device can be used to perform the method embodiment of the present invention. Details described in the device embodiments of the present invention should be regarded as supplements to the above method embodiments; details not disclosed in the device embodiments of the present invention can be implemented with reference to the above method embodiments.
图3是本发明一个是实施例的一种基于异构图神经网络的目标服务确定装置示意图,如图3所示,该装置300包括:Figure 3 is a schematic diagram of a target service determination device based on a heterogeneous graph neural network according to one embodiment of the present invention. As shown in Figure 3, the device 300 includes:
信息获取模块301,用于获取待评估目标的社交信息;Information acquisition module 301, used to acquire social information of the target to be evaluated;
注意力权重计算模块302,用于根据所述社交信息构建具有不同类型社交关系的社交关系异构图,确定与所述待评估目标对应的注意力权重;The attention weight calculation module 302 is used to construct a social relationship heterogeneous graph with different types of social relationships based on the social information, and determine the attention weight corresponding to the target to be evaluated;
评估模块303,用于将所述注意力权重输入预设的安全评估模型计算所述待评估目标的信任度;Evaluation module 303, configured to input the attention weight into a preset security evaluation model to calculate the trust degree of the target to be evaluated;
服务确定模块304,用于基于所述信任度与所述信任度趋势策略的比对结果,确定所述待评估目标的服务策略并进行推送。The service determination module 304 is configured to determine and push the service policy of the target to be evaluated based on the comparison result between the trust degree and the trust degree trend policy.
其中,信息获取模块301进一步包括:Among them, the information acquisition module 301 further includes:
社交关系获取单元:用于获取待评估目标的社交关系信息,包括通话信息、通讯录信息及地理位置信息。Social relationship acquisition unit: used to obtain social relationship information of the target to be evaluated, including call information, address book information and geographical location information.
根据本发明的优选实施方式,本装置还包括模型训练模块,用于将历史用户的社交信息作为训练样本;根据所述训练样本构建社交关系异构图,计算得到所述历史用户的注意力权重向量;将所述注意力权重向量输入卷积神经网络模型进行训练,得到所述安全评估模型。According to a preferred embodiment of the present invention, the device further includes a model training module for using the social information of historical users as training samples; constructing a social relationship heterogeneous graph based on the training samples, and calculating the attention weight of the historical users Vector; input the attention weight vector into the convolutional neural network model for training to obtain the security assessment model.
根据本发明的优选实施方式,模型训练模块进一步用于:将历史用户的注意力权重向量输入神经网络模型,输出的安全评分与所述历史用户实际的安全评分进行比较;通过损失函数调整模型参数使得模型输出的安全评分与所述历史用户实际的安全评分误差最小,最终得到所述安全评估模型。According to a preferred embodiment of the present invention, the model training module is further used to: input the attention weight vector of historical users into the neural network model, compare the output safety score with the actual safety score of the historical user; adjust the model parameters through a loss function The error between the security score output by the model and the actual security score of the historical user is minimized, and the security assessment model is finally obtained.
根据本发明的优选实施方式,注意力权重计算模块302进一步包括:社交关系异构图创建单元,用于将与所述待评估目标存在社交关系的目标作为邻居节点,将目标间的社交信息作为边,构建社交关系异构图;According to a preferred embodiment of the present invention, the attention weight calculation module 302 further includes: a social relationship heterogeneous graph creation unit, configured to use targets that have social relationships with the target to be evaluated as neighbor nodes, and use social information between targets as Edges, constructing a heterogeneous graph of social relationships;
节点注意力权重计算单元,用于根据社交关系异构图计算不同邻居节点与待评估目标间的节点注意力权重;The node attention weight calculation unit is used to calculate the node attention weight between different neighbor nodes and the target to be evaluated based on the social relationship heterogeneous graph;
边注意力权重计算单元,用于根据所述节点注意力权重计算待评估目标与各个邻居节点之间的边注意力权重。An edge attention weight calculation unit is used to calculate edge attention weights between the target to be evaluated and each neighbor node according to the node attention weight.
根据本发明的优选实施方式,评估模块303进一步包括:节点注意力权重向量计算单元,用于对所述节点注意力权重加权求和得到节点注意力权重向量;According to the preferred embodiment of the present invention, the evaluation module 303 further includes: a node attention weight vector calculation unit, used to weight and sum the node attention weights to obtain a node attention weight vector;
边注意力权重向量计算单元,用于对所述边注意力权重加权求和得到边注意力权重向量;
An edge attention weight vector calculation unit is used to perform a weighted sum of the edge attention weights to obtain an edge attention weight vector;
评估单元,用于将待评估目标的节点注意力权重向量和边注意力权重向量分别输入安全评估模型得到所述待评估目标的信任度。An evaluation unit is used to respectively input the node attention weight vector and the edge attention weight vector of the target to be evaluated into the security evaluation model to obtain the trust degree of the target to be evaluated.
根据本发明的优选实施方式,服务确定模块304进一步包括:信任度阈值区间设置单元,用于设定不同的信任度阈值区间;服务策略制定单元,用于对不同的信任度阈值区间设置对应的服务策略;服务确定单元,用于根据所述待评估目标的信任度所在的信任度阈值区间提供对应的服务策略。According to the preferred embodiment of the present invention, the service determination module 304 further includes: a trust threshold interval setting unit, used to set different trust threshold intervals; a service policy formulation unit, used to set corresponding trust threshold intervals for different trust levels. Service policy; a service determination unit, configured to provide a corresponding service policy according to the trust threshold interval in which the trust of the target to be evaluated is located.
根据本发明的优选实施方式,本装置还包括更新模块,用于定期更新所述训练样本,并根据更新后的训练样本更新所述安全评估模型。According to a preferred embodiment of the present invention, the device further includes an update module for regularly updating the training samples and updating the security assessment model according to the updated training samples.
信息获取模块301获取用户不同类型的社交信息,注意力权重计算模块302根据所述社交信息构建具有不同类型社交关系的社交关系异构图,确定与所述待评估目标对应的注意力权重,评估模块303根据计算得到的注意力权重计算注意力权重向量,并输入预设的安全评估模型计算所述待评估目标的信任度,服务确定模块304根据评估得到的信任度与信任度趋势策略的比对结果,确定所述待评估目标的服务策略并进行推送。解决了在用户数据较少的情况下,无法通过用户特征预测出用户信任度或预测结果不准确的问题,根据预测的用户的信任度在对用户进行服务前及时做出应对策略,避免损失,保障服务的数据安全。The information acquisition module 301 acquires different types of social information of the user. The attention weight calculation module 302 constructs a social relationship heterogeneous graph with different types of social relationships based on the social information, determines the attention weight corresponding to the target to be evaluated, and evaluates The module 303 calculates the attention weight vector according to the calculated attention weight, and inputs the preset security assessment model to calculate the trust degree of the target to be evaluated. The service determination module 304 calculates the trust degree based on the ratio of the evaluated trust degree and the trust degree trend policy. Based on the results, the service strategy of the target to be evaluated is determined and pushed. It solves the problem that user trust cannot be predicted through user characteristics or the prediction results are inaccurate when there is little user data. Based on the predicted user trust, response strategies can be made in a timely manner before providing services to users to avoid losses. Ensure the data security of the service.
本发明的一个实施例的电子设备,该电子设备包括处理器和存储器,所述存储器用于存储计算机可执行程序,当所述计算机程序被所述处理器执行时,所述处理器执行基于异构图神经网络的目标服务确定方法。An electronic device according to an embodiment of the present invention. The electronic device includes a processor and a memory. The memory is used to store a computer executable program. When the computer program is executed by the processor, the processor executes a program based on an A target service determination method for graphing neural networks.
电子设备以通用计算设备的形式表现。其中处理器可以是一个,也可以是多个并且协同工作。本发明也不排除进行分布式处理,即处理器可以分散在不同的实体设备中。本发明的电子设备并不限于单一实体,也可以是多个实体设备的总和。Electronic devices take the form of general-purpose computing devices. There can be one processor or multiple processors working together. The present invention also does not exclude distributed processing, that is, the processors can be dispersed in different physical devices. The electronic device of the present invention is not limited to a single entity, and can also be the sum of multiple physical devices.
所述存储器存储有计算机可执行程序,通常是机器可读的代码。所述计算机可读程序可以被所述处理器执行,以使得电子设备能够执行本发明的方法,或者方法中的至少部分步骤。The memory stores computer-executable programs, typically machine-readable code. The computer-readable program can be executed by the processor, so that the electronic device can perform the method of the present invention, or at least part of the steps in the method.
所述存储器包括易失性存储器,例如随机存取存储单元(RAM)和/或高速缓存存储单元,还可以是非易失性存储器,如只读存储单元(ROM)。
The memory includes volatile memory, such as a random access memory unit (RAM) and/or a cache memory unit, and may also be a non-volatile memory, such as a read-only memory unit (ROM).
可选的,该实施例中,电子设备还包括有I/O接口,其用于电子设备与外部的设备进行数据交换。I/O接口可以为表示几类总线结构中的一种或多种,包括存储单元总线或者存储单元控制器、外围总线、图形加速端口、处理单元或者使用多种总线结构中的任意总线结构的局域总线。Optionally, in this embodiment, the electronic device further includes an I/O interface, which is used for data exchange between the electronic device and external devices. The I/O interface may represent one or more of several types of bus structures, including a memory unit bus or memory unit controller, a peripheral bus, a graphics acceleration port, a processing unit, or using any of a variety of bus structures. local bus.
应当理解,本发明的电子设备中还可以包括上述示例中未示出的元件或组件。例如,有些电子设备中还包括有显示屏等显示单元,有些电子设备还包括人机交互元件,例如按扭、键盘等。只要该电子设备能够执行存储器中的计算机可读程序以实现本发明方法或方法的至少部分步骤,均可认为是本发明所涵盖的电子设备。It should be understood that the electronic device of the present invention may also include elements or components not shown in the above examples. For example, some electronic devices also include display units such as display screens, and some electronic devices also include human-computer interaction components, such as buttons and keyboards. As long as the electronic device can execute the computer-readable program in the memory to implement the method of the present invention or at least part of the steps of the method, it can be considered as an electronic device covered by the present invention.
本发明的一个实施例的计算机可读记录介质。计算机可读记录介质中存储有计算机可执行程序,所述计算机可执行程序被执行时,实现本发明上述的基于异构图神经网络的目标服务确定方法。所述计算机可读存储介质可以包括在基带中或者作为载波一部分传播的数据信号,其中承载了可读程序代码。这种传播的数据信号可以采用多种形式,包括但不限于电磁信号、光信号或上述的任意合适的组合。可读存储介质还可以是可读存储介质以外的任何可读介质,该可读介质可以发送、传播或者传输用于由指令执行系统、装置或者器件使用或者与其结合使用的程序。可读存储介质上包含的程序代码可以用任何适当的介质传输,包括但不限于无线、有线、光缆、RF等等,或者上述的任意合适的组合。A computer-readable recording medium according to an embodiment of the present invention. The computer-readable recording medium stores a computer-executable program. When the computer-executable program is executed, the above-mentioned target service determination method based on heterogeneous graph neural network of the present invention is implemented. The computer-readable storage medium may include a data signal propagated in baseband or as part of a carrier wave carrying readable program code therein. Such propagated data signals may take many forms, including but not limited to electromagnetic signals, optical signals, or any suitable combination of the above. A readable storage medium may also be any readable medium other than a readable storage medium that can transmit, propagate, or transport the program for use by or in connection with an instruction execution system, apparatus, or device. Program code contained on a readable storage medium may be transmitted using any suitable medium, including but not limited to wireless, wired, optical cable, RF, etc., or any suitable combination of the above.
上述计算机可读介质承载有一个或者多个程序,当上述一个或者多个程序被一个该设备执行时,使得该计算机可读介质实现如下功能:获取待评估目标的社交信息;根据所述社交信息构建具有不同类型社交关系的社交关系异构图,确定与所述待评估目标对应的注意力权重;将所述注意力权重输入预设的安全评估模型计算所述待评估目标的信任度。The above-mentioned computer-readable medium carries one or more programs. When the above-mentioned one or more programs are executed by a device, the computer-readable medium realizes the following functions: obtain the social information of the target to be evaluated; and according to the social information Construct a heterogeneous social relationship graph with different types of social relationships, and determine the attention weight corresponding to the target to be evaluated; input the attention weight into a preset security assessment model to calculate the trust degree of the target to be evaluated.
通过以上对实施方式的描述,本领域的技术人员易于理解,本发明可以由能够执行特定计算机程序的硬件来实现,例如本发明的系统,以及系统中包含的电子处理单元、服务器、客户端、手机、控制单元、处理器等。本发明也可以由执行本发明的方法的计算机软件来实现。但需要说明的是,执行本发明的方法的计算机软件并不限于由一个或特定个的硬件实体中执行,其也可以是由不特定具体硬件的以分布式的方式来实现,例如计算机程序执行的某些方法步骤可以在移动客户端执行,另一部分可以在智能表、智能识别笔等中执行。对于计算机软件,软件产品可以存储在一个计算机可读的存储介质(可以是CD-ROM,U盘,移动硬盘等)中,也可以分布式存储于网络上,只要其能使得电子设备执行根据本发明的方法。Through the above description of the embodiments, those skilled in the art can easily understand that the present invention can be implemented by hardware capable of executing specific computer programs, such as the system of the present invention, and the electronic processing unit, server, client, etc. included in the system. Mobile phones, control units, processors, etc. The invention may also be implemented by computer software executing the method of the invention. However, it should be noted that the computer software for executing the method of the present invention is not limited to being executed by one or a specific hardware entity. It can also be implemented by unspecified hardware in a distributed manner, such as computer program execution. Some of the method steps can be performed on the mobile client, and other parts can be performed on smart tables, smart recognition pens, etc. For computer software, the software product can be stored in a computer-readable storage medium (can be a CD-ROM, USB flash drive, mobile hard disk, etc.), or can be distributed on the network, as long as it can enable the electronic device to execute according to this method of invention.
综上所述,本发明可以以硬件实现,或者以在一个或者多个处理器上运行的软件模块实现,或者以它们的组合实现。本领域的技术人员应当理解,可以在实践中使用微处理器或者数字信号处理器(DSP)等通用数据处理设备来实现根据本发明实施例中的一些或者全部部件的一些或者全部功能。本发明还可以实现为用于执行这里所描述的方法的一部分或者全部的设备或者装置程序(例如,计算机程序和计算机程序产品)。这样的实现本发明的程序可以存储在计算机可读介质上,或者可以具有一个或者多个信号的形式。这样的信号可以从因特网网站上下载得到,或者在载体信号上提供,或者以任何其他形式提供。In summary, the present invention can be implemented in hardware, or in a software module running on one or more processors, or in a combination thereof. Those skilled in the art should understand that general data processing devices such as microprocessors or digital signal processors (DSP) may be used in practice to implement some or all functions of some or all components according to embodiments of the present invention. The invention may also be implemented as an apparatus or apparatus program (eg, computer program and computer program product) for performing part or all of the methods described herein. Such a program implementing the present invention may be stored on a computer-readable medium, or may be in the form of one or more signals. Such signals may be downloaded from an Internet website, or provided on a carrier signal, or in any other form.
以上所述的具体实施例,对本发明的目的、技术方案和有益效果进行了进一步详细说明,应理解的是,本发明不与任何特定计算机、虚拟装置或者电子设备固有相关,各种通用装置也可以实现本发明。以上所述仅为本发明的具体实施例而已,并不用于限制本发明,凡在本发明的精神和原则之内,所做的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。
The above-mentioned specific embodiments further describe the purpose, technical solutions and beneficial effects of the present invention in detail. It should be understood that the present invention is not inherently related to any specific computer, virtual device or electronic device, and various general-purpose devices are also The invention can be implemented. The above are only specific embodiments of the present invention and are not intended to limit the present invention. Any modifications, equivalent substitutions, improvements, etc. made within the spirit and principles of the present invention shall be included in the scope of the present invention. within the scope of protection.
Claims (13)
- 一种基于异构图神经网络的目标服务确定方法,其特征在于,包括:A target service determination method based on heterogeneous graph neural network, which is characterized by including:获取待评估目标的社交信息;Obtain social information of the target to be evaluated;根据所述社交信息构建具有不同类型社交关系的社交关系异构图,通过所述社交关系异构图中节点的社交关系确定与所述待评估目标对应的注意力权重;Construct a social relationship heterogeneous graph with different types of social relationships based on the social information, and determine the attention weight corresponding to the target to be evaluated through the social relationships of nodes in the social relationship heterogeneous graph;将所述注意力权重输入预设的安全评估模型计算所述待评估目标的信任度;Input the attention weight into a preset security evaluation model to calculate the trust degree of the target to be evaluated;基于所述信任度与所述信任度趋势策略的比对结果,确定所述待评估目标的服务策略并进行推送。Based on the comparison result between the trust degree and the trust degree trend policy, the service policy of the target to be evaluated is determined and pushed.
- 根据权利要求1所述的基于异构图神经网络的目标服务确定方法,其特征在于,所述根据所述社交信息构建具有不同类型社交关系的社交关系异构图,确定与所述待评估目标对应的注意力权重,进一步包括:The target service determination method based on heterogeneous graph neural network according to claim 1, characterized in that, constructing a social relationship heterogeneous graph with different types of social relationships according to the social information, determining the target service that is related to the target to be evaluated. The corresponding attention weight further includes:将与所述待评估目标存在社交关系的目标作为邻居节点,将目标间的社交信息作为边,构建社交关系异构图;Use the targets that have a social relationship with the target to be evaluated as neighbor nodes, and use the social information between the targets as edges to construct a heterogeneous graph of social relationships;根据社交关系异构图计算不同邻居节点与待评估目标间的节点注意力权重;Calculate the node attention weights between different neighbor nodes and the target to be evaluated based on the heterogeneous social relationship graph;根据所述节点注意力权重计算待评估目标与各个邻居节点之间的边注意力权重。Calculate the edge attention weight between the target to be evaluated and each neighbor node according to the node attention weight.
- 根据权利要求2所述的基于异构图神经网络的目标服务确定方法,其特征在于,所述将所述注意力权重输入预设的安全评估模型计算所述待评估目标的信任度,进一步包括:The target service determination method based on heterogeneous graph neural network according to claim 2, characterized in that the said attention weight is input into a preset security assessment model to calculate the trust degree of the target to be assessed, further comprising: :对所述节点注意力权重加权求和得到节点注意力权重向量;Perform a weighted sum of the node attention weights to obtain a node attention weight vector;对所述边注意力权重加权求和得到边注意力权重向量;A weighted sum of the edge attention weights is used to obtain an edge attention weight vector;将待评估目标的节点注意力权重向量和边注意力权重向量分别输入安全评估模型得到所述待评估目标的信任度。 The node attention weight vector and edge attention weight vector of the target to be evaluated are respectively input into the security evaluation model to obtain the trust degree of the target to be evaluated.
- 根据权利要求1所述的基于异构图神经网络的目标服务确定方法,其特征在于,所述信任度趋势策略的比对结果,确定所述待评估目标的服务策略并进行推送进一步包括:The target service determination method based on heterogeneous graph neural network according to claim 1, characterized in that the comparison result of the trust trend strategy, determining the service strategy of the target to be evaluated and pushing it further includes:设定不同的信任度阈值区间;Set different trust threshold intervals;对不同的信任度阈值区间设置对应的服务策略;Set corresponding service policies for different trust threshold intervals;根据所述待评估目标的信任度所在的信任度阈值区间提供对应的服务策略。A corresponding service policy is provided according to the trust threshold interval in which the trust level of the target to be evaluated is located.
- 根据权利要求1所述的基于异构图神经网络的目标服务确定方法,其特征在于,在根据所述社交信息构建具有不同类型社交关系的社交关系异构图,确定与所述待评估目标对应的注意力权重前,所述方法还包括:The target service determination method based on heterogeneous graph neural network according to claim 1, characterized in that, after constructing a social relationship heterogeneous graph with different types of social relationships according to the social information, it is determined that the target service corresponding to the target to be evaluated is Before the attention weight, the method also includes:将历史用户的社交信息作为训练样本;Use social information of historical users as training samples;根据所述训练样本构建社交关系异构图,计算得到所述历史用户的注意力权重向量;Construct a heterogeneous social relationship graph based on the training samples, and calculate the attention weight vector of the historical users;将所述注意力权重向量输入卷积神经网络模型进行训练,得到所述安全评估模型。The attention weight vector is input into the convolutional neural network model for training to obtain the security assessment model.
- 根据权利要求5所述的基于异构图神经网络的目标服务确定方法,其特征在于,所述将所述注意力权重向量输入卷积神经网络模型进行训练,得到所述安全评估模型,进一步包括:The target service determination method based on heterogeneous graph neural network according to claim 5, characterized in that the attention weight vector is input into a convolutional neural network model for training to obtain the security assessment model, further comprising: :将历史用户的注意力权重向量输入神经网络模型,输出的安全评分与所述历史用户实际的安全评分进行比较;Input the attention weight vector of historical users into the neural network model, and compare the output safety score with the actual safety score of the historical user;通过损失函数调整模型参数使得模型输出的安全评分与所述历史用户实际的安全评分误差最小,最终得到所述安全评估模型。The model parameters are adjusted through the loss function to minimize the error between the security score output by the model and the actual security score of the historical users, and finally the security assessment model is obtained.
- 根据权利要求6所述的基于异构图神经网络的目标服务确定方法,其特征在于,所述方法还包括:The target service determination method based on heterogeneous graph neural network according to claim 6, characterized in that the method further includes:定期更新所述训练样本,并根据更新后的训练样本更新所述安全评估模型。The training samples are regularly updated, and the security assessment model is updated based on the updated training samples.
- 一种基于异构图神经网络的目标服务确定装置,其特征在于,包括:A target service determination device based on heterogeneous graph neural network, which is characterized by including:信息获取模块,用于获取待评估目标的社交信息; Information acquisition module, used to obtain social information of the target to be evaluated;注意力权重计算模块,用于根据所述社交信息构建具有不同类型社交关系的社交关系异构图,确定与所述待评估目标对应的注意力权重;An attention weight calculation module, configured to construct a heterogeneous social relationship graph with different types of social relationships based on the social information, and determine the attention weight corresponding to the target to be evaluated;评估模块,用于将所述注意力权重输入预设的安全评估模型计算所述待评估目标的信任度;An evaluation module, configured to input the attention weight into a preset security evaluation model to calculate the trust degree of the target to be evaluated;服务确定模块,用于基于所述信任度与所述信任度趋势策略的比对结果,确定所述待评估目标的服务策略并进行推送。A service determination module, configured to determine and push the service policy of the target to be evaluated based on the comparison result between the trust degree and the trust degree trend policy.
- 根据权利要求8所述的基于异构图神经网络的目标服务确定装置,其特征在于,所述注意力权重计算模块进一步包括:The target service determination device based on heterogeneous graph neural network according to claim 8, characterized in that the attention weight calculation module further includes:社交关系异构图创建单元,用于将与所述待评估目标存在社交关系的目标作为邻居节点,将目标间的社交信息作为边,构建社交关系异构图;A social relationship heterogeneous graph creation unit is used to construct a social relationship heterogeneous graph using targets that have a social relationship with the target to be evaluated as neighbor nodes and social information between targets as edges;节点注意力权重计算单元,用于根据社交关系异构图计算不同邻居节点与待评估目标间的节点注意力权重;The node attention weight calculation unit is used to calculate the node attention weight between different neighbor nodes and the target to be evaluated based on the social relationship heterogeneous graph;边注意力权重计算单元,用于根据所述节点注意力权重计算待评估目标与各个邻居节点之间的边注意力权重。An edge attention weight calculation unit is used to calculate edge attention weights between the target to be evaluated and each neighbor node according to the node attention weight.
- 根据权利要求9所述的基于异构图神经网络的目标服务确定装置,其特征在于,所述评估模块进一步包括:The target service determination device based on heterogeneous graph neural network according to claim 9, characterized in that the evaluation module further includes:节点注意力权重向量计算单元,用于对所述节点注意力权重加权求和得到节点注意力权重向量;A node attention weight vector calculation unit is used to perform a weighted sum of the node attention weights to obtain a node attention weight vector;边注意力权重向量计算单元,用于对所述边注意力权重加权求和得到边注意力权重向量;An edge attention weight vector calculation unit is used to perform a weighted sum of the edge attention weights to obtain an edge attention weight vector;评估单元,用于将待评估目标的节点注意力权重向量和边注意力权重向量分别输入安全评估模型得到所述待评估目标的信任度。An evaluation unit is used to respectively input the node attention weight vector and the edge attention weight vector of the target to be evaluated into the security evaluation model to obtain the trust degree of the target to be evaluated.
- 根据权利要求8所述的基于异构图神经网络的目标服务确定方法,其特征在于,所述信任度趋势策略的比对结果,确定所述待评估目标的服务策略并进行推送进一步包括:The target service determination method based on heterogeneous graph neural network according to claim 8, characterized in that the comparison result of the trust trend strategy, determining the service strategy of the target to be evaluated and pushing it further includes:设定不同的信任度阈值区间;Set different trust threshold intervals;对不同的信任度阈值区间设置对应的服务策略;Set corresponding service policies for different trust threshold intervals;根据所述待评估目标的信任度所在的信任度阈值区间提供对应的服务策略。 A corresponding service policy is provided according to the trust threshold interval in which the trust level of the target to be evaluated is located.
- 一种电子设备,包括处理器和存储器,所述存储器用于存储计算机可执行程序,其特征在于:An electronic device including a processor and a memory, the memory being used to store computer executable programs, characterized by:当所述计算机程序被所述处理器执行时,所述处理器执行如权利要求1-7中任一项所述的方法。When the computer program is executed by the processor, the processor performs the method of any one of claims 1-7.
- 一种计算机可读介质,存储有计算机可执行程序,其特征在于,所述计算机可执行程序被执行时,实现如权利要求1-7中任一项所述的方法。 A computer-readable medium storing a computer-executable program, characterized in that when the computer-executable program is executed, the method according to any one of claims 1-7 is implemented.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210786180.5A CN115310762A (en) | 2022-07-04 | 2022-07-04 | Target service determination method and device based on heterogeneous graph neural network |
CN202210786180.5 | 2022-07-04 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2024007599A1 true WO2024007599A1 (en) | 2024-01-11 |
Family
ID=83856305
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2023/077879 WO2024007599A1 (en) | 2022-07-04 | 2023-02-23 | Heterogeneous graph neural network-based method and apparatus for determining target service |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN115310762A (en) |
WO (1) | WO2024007599A1 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117670572A (en) * | 2024-02-02 | 2024-03-08 | 南京财经大学 | Social behavior prediction method, system and product based on graph comparison learning |
CN117911161A (en) * | 2024-01-25 | 2024-04-19 | 广东顺银产融投资有限公司 | Project investment decision method, device and storage medium |
CN117932285A (en) * | 2024-03-25 | 2024-04-26 | 清华大学 | Data importance assessment method and device based on different composition |
CN118233382A (en) * | 2024-05-22 | 2024-06-21 | 苏州元脑智能科技有限公司 | Congestion control method, congestion control model training method, switch and medium |
CN118427371A (en) * | 2024-07-02 | 2024-08-02 | 宁波瑞能智慧科技股份有限公司 | Multimedia presentation method and system based on data identification |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115310762A (en) * | 2022-07-04 | 2022-11-08 | 上海淇玥信息技术有限公司 | Target service determination method and device based on heterogeneous graph neural network |
CN116089722B (en) * | 2023-02-15 | 2023-11-21 | 北京欧拉认知智能科技有限公司 | Implementation method, device, computing equipment and storage medium based on graph yield label |
CN117608455B (en) * | 2023-10-20 | 2024-05-24 | 中国中建设计研究院有限公司 | Ecological system interactive image calculation processing method and system based on calculation model |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20200137083A1 (en) * | 2018-10-24 | 2020-04-30 | Nec Laboratories America, Inc. | Unknown malicious program behavior detection using a graph neural network |
CN112084428A (en) * | 2020-09-17 | 2020-12-15 | 辽宁工程技术大学 | Collaborative filtering recommendation method based on coupling network embedding and knowledge graph |
CN112150013A (en) * | 2020-09-27 | 2020-12-29 | 平安资产管理有限责任公司 | Enterprise risk early warning method, device, equipment and readable storage medium |
CN113609398A (en) * | 2021-08-17 | 2021-11-05 | 石家庄铁道大学 | Social recommendation method based on heterogeneous graph neural network |
CN114579879A (en) * | 2022-05-06 | 2022-06-03 | 南方科技大学 | Friend recommendation method, device, equipment and storage medium |
CN115310762A (en) * | 2022-07-04 | 2022-11-08 | 上海淇玥信息技术有限公司 | Target service determination method and device based on heterogeneous graph neural network |
-
2022
- 2022-07-04 CN CN202210786180.5A patent/CN115310762A/en active Pending
-
2023
- 2023-02-23 WO PCT/CN2023/077879 patent/WO2024007599A1/en unknown
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20200137083A1 (en) * | 2018-10-24 | 2020-04-30 | Nec Laboratories America, Inc. | Unknown malicious program behavior detection using a graph neural network |
CN112084428A (en) * | 2020-09-17 | 2020-12-15 | 辽宁工程技术大学 | Collaborative filtering recommendation method based on coupling network embedding and knowledge graph |
CN112150013A (en) * | 2020-09-27 | 2020-12-29 | 平安资产管理有限责任公司 | Enterprise risk early warning method, device, equipment and readable storage medium |
CN113609398A (en) * | 2021-08-17 | 2021-11-05 | 石家庄铁道大学 | Social recommendation method based on heterogeneous graph neural network |
CN114579879A (en) * | 2022-05-06 | 2022-06-03 | 南方科技大学 | Friend recommendation method, device, equipment and storage medium |
CN115310762A (en) * | 2022-07-04 | 2022-11-08 | 上海淇玥信息技术有限公司 | Target service determination method and device based on heterogeneous graph neural network |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117911161A (en) * | 2024-01-25 | 2024-04-19 | 广东顺银产融投资有限公司 | Project investment decision method, device and storage medium |
CN117670572A (en) * | 2024-02-02 | 2024-03-08 | 南京财经大学 | Social behavior prediction method, system and product based on graph comparison learning |
CN117670572B (en) * | 2024-02-02 | 2024-05-03 | 南京财经大学 | Social behavior prediction method, system and product based on graph comparison learning |
CN117932285A (en) * | 2024-03-25 | 2024-04-26 | 清华大学 | Data importance assessment method and device based on different composition |
CN118233382A (en) * | 2024-05-22 | 2024-06-21 | 苏州元脑智能科技有限公司 | Congestion control method, congestion control model training method, switch and medium |
CN118427371A (en) * | 2024-07-02 | 2024-08-02 | 宁波瑞能智慧科技股份有限公司 | Multimedia presentation method and system based on data identification |
Also Published As
Publication number | Publication date |
---|---|
CN115310762A (en) | 2022-11-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2024007599A1 (en) | Heterogeneous graph neural network-based method and apparatus for determining target service | |
US11663364B2 (en) | Whole-lifecycle encrypted big data analysis method and system for the data from the different sources | |
US20120278264A1 (en) | Techniques to filter media content based on entity reputation | |
US20120131047A1 (en) | Social genome | |
CN110135978B (en) | User financial risk assessment method and device, electronic equipment and readable medium | |
WO2023071105A1 (en) | Method and apparatus for analyzing feature variable, computer device, and storage medium | |
US10282461B2 (en) | Structure-based entity analysis | |
US20180083999A1 (en) | Self-published security risk management | |
US20230104176A1 (en) | Using a Machine Learning System to Process a Corpus of Documents Associated With a User to Determine a User-Specific and/or Process-Specific Consequence Index | |
CN111181757A (en) | Information security risk prediction method and device, computing equipment and storage medium | |
CN107682250A (en) | A kind of method and apparatus for being used to perform social operation | |
CN113298121A (en) | Message sending method and device based on multi-data source modeling and electronic equipment | |
CN111414490A (en) | Method and device for determining lost connection restoration information, electronic equipment and storage medium | |
CN111598713A (en) | Cluster recognition method and device based on similarity weight updating and electronic equipment | |
WO2019052469A1 (en) | Network request processing method and apparatus, electronic device, and storage medium | |
Bhowmik et al. | mTrust: call behavioral trust predictive analytics using unsupervised learning in mobile cloud computing | |
Ali-Eldin et al. | A risk evaluation approach for authorization decisions in social pervasive applications | |
CN111209403B (en) | Data processing method, device, medium and electronic equipment | |
US10803514B1 (en) | Intelligent product plan dataset | |
US20230199074A1 (en) | Computer-based systems for dynamic persona-based access to computer network resources based on machine learning techniques and methods of use thereof | |
CN110599118A (en) | Data processing method and device | |
CN113570207B (en) | User policy allocation method and device and electronic equipment | |
CN115545753A (en) | Partner prediction method based on Bayesian algorithm and related equipment | |
US11068236B2 (en) | Identification of users across multiple platforms | |
US9892280B1 (en) | Identifying illegitimate accounts based on images |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 23834383 Country of ref document: EP Kind code of ref document: A1 |