CN110189167A - A kind of moving advertising fraud detection method based on the insertion of isomery figure - Google Patents
A kind of moving advertising fraud detection method based on the insertion of isomery figure Download PDFInfo
- Publication number
- CN110189167A CN110189167A CN201910417284.7A CN201910417284A CN110189167A CN 110189167 A CN110189167 A CN 110189167A CN 201910417284 A CN201910417284 A CN 201910417284A CN 110189167 A CN110189167 A CN 110189167A
- Authority
- CN
- China
- Prior art keywords
- node
- fraud detection
- mobile
- model
- application
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000001514 detection method Methods 0.000 title claims abstract description 40
- 238000003780 insertion Methods 0.000 title abstract 2
- 230000037431 insertion Effects 0.000 title abstract 2
- 239000013598 vector Substances 0.000 claims abstract description 24
- 238000005295 random walk Methods 0.000 claims abstract description 12
- 238000012549 training Methods 0.000 claims abstract description 8
- 230000005012 migration Effects 0.000 claims abstract description 7
- 238000013508 migration Methods 0.000 claims abstract description 7
- 238000007781 pre-processing Methods 0.000 claims abstract description 7
- 230000006870 function Effects 0.000 claims description 15
- 238000000034 method Methods 0.000 claims description 11
- 238000013507 mapping Methods 0.000 claims description 9
- 238000005070 sampling Methods 0.000 claims description 9
- 230000002159 abnormal effect Effects 0.000 claims description 5
- 238000004140 cleaning Methods 0.000 claims description 3
- 238000005457 optimization Methods 0.000 claims description 3
- 238000013136 deep learning model Methods 0.000 claims description 2
- 238000010801 machine learning Methods 0.000 claims description 2
- 238000004458 analytical method Methods 0.000 description 3
- 230000006399 behavior Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000007637 random forest analysis Methods 0.000 description 2
- 238000000547 structure data Methods 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000007405 data analysis Methods 0.000 description 1
- 238000013135 deep learning Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0241—Advertisements
- G06Q30/0242—Determining effectiveness of advertisements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0241—Advertisements
- G06Q30/0248—Avoiding fraud
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- Strategic Management (AREA)
- Finance (AREA)
- Game Theory and Decision Science (AREA)
- Entrepreneurship & Innovation (AREA)
- Economics (AREA)
- Marketing (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a kind of moving advertising fraud detection methods based on the insertion of isomery figure, comprising steps of 1) obtaining moving advertising daily record data and pre-processing to data;2) user, application and advertisement three's incidence relation data are extracted, isomery figure of having the right is constructed;3) first path is defined, the migration number and longest step-length of each node are set, traverses isomery node of graph of having the right, constructs node member path random walk sequence;4) language model is used, the dense vector of lower dimensional space for constructing isomery figure interior joint of having the right indicates;5) label is defined, subject data are constituted;6) moving advertising fraud detection model is constructed;7) the mobile application subject data of training part are input to moving advertising fraud detection model training, obtain moving advertising fraud detection model;8) fraud detection is carried out to mobile application using moving advertising fraud detection model.The present invention effectively detects the mobile application of fraud using the entity associated relationship in moving advertising system.
Description
Technical Field
The invention relates to the technical field of mobile application advertisement fraud, in particular to a mobile advertisement fraud detection method based on heterogeneous graph embedding.
Background
As a novel marketing mode depending on an intelligent terminal, the mobile advertisement has the characteristics of accuracy, interactivity, flexibility, individuation and the like compared with the traditional media. However, the continuous growth of advertisement fraud poses a serious threat to the mobile advertisement market, it is very difficult to identify the fraud of mobile applications, and advertisement fraud detection has become a hot problem to be solved urgently in the mobile internet advertisement ecosystem. Graph analysis methods based on graph structure data are applied to anomaly and fraud detection due to good representation capability and robustness of the structured data.
The traditional analysis method based on the graph structure has low efficiency in large-scale graphs, the existing effective schemes such as deep learning are difficult to be directly applied to analysis of graph structure data, and the graph embedding method learns effective vector representation in a low-dimensional space for nodes in the graphs, so that subsequent graph data analysis is better supported. Aiming at a complicated and variable mobile advertisement fraud means, how to utilize a graph embedding-based method to carry out efficient detection on fraud mobile application is a problem to be solved urgently.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides a mobile advertisement fraud detection method based on heterogeneous graph embedding, which can improve the accuracy of mobile application advertisement fraud detection.
In order to achieve the purpose, the technical scheme provided by the invention is as follows: a mobile advertisement fraud detection method based on heterogeneous graph embedding comprises the following steps:
1) acquiring mobile advertisement log data, and preprocessing the data;
2) extracting incidence relation data of users, applications and advertisements in the mobile advertisement ecosystem, and constructing an authorized heterogeneous graph and a meta template corresponding to the authorized heterogeneous graph Andrespectively represent a category set and a relation category set of edges and satisfy
3) Defining meta-pathsSetting the number of wandering times n and the longest step length l of each node, traversing the nodes in the weighted heterogeneous graph G, and constructing n weighted random wandering paths S of the nodes vv={Sv1,Sv2,...,SvnFourthly, finally obtaining an element path random walk sequence S with the right different composition G;
4) constructing a language model, and learning d-dimensional space dense vector representation X belonging to R in P mobile application nodes in the weighted abnormal graph GP×dForming an input feature vector;
5) manually marking the mobile application of the training part, and setting a label value of each mobile application according to the information of whether the mobile application is a fraud application; the tag of the fraudulent application is set to 1 and the tag of the non-fraudulent application is set to 0, resulting in PtrainIndividual label dataPtrain<P,PtrainApplying a total number P η of floating point numbers smaller than 1 and larger than 0 to the training part, and combining the floating point numbers with the corresponding input feature vectors in the step 4) to form tested data;
6) constructing a fraud detection model for detecting fraudulent mobile applications;
7) inputting the tested data into a fraud detection model, and acquiring parameters of the fraud detection model to obtain a mobile advertisement fraud detection model;
8) inputting the input characteristics of the mobile application which is not marked into the mobile advertisement fraud detection model to detect the fraud application.
In the step 1), the data preprocessing comprises data cleaning and missing value filling; the mobile ad log data contains four attributes: a. unique identification attribute: unique identifiers of users, applications, advertisements; b. the time attribute is as follows: the user uses the application to operate the specific time of the advertisement, and the time is accurate to the second; c. position attribute: identifying a geographic location at which the user is located; d. the device attribute is as follows: the model of the device used by the user, the size of the display screen, the operating system.
In step 2), the authorized heterogeneous graph G comprises three types of nodes which are user nodes respectivelyApplication nodeAnd advertising node
The authorized different composition G comprises three node relations which are respectively used by usersUser operated advertisementApplication display advertisementIts corresponding meta templateIndicating that there is a mapping function for any node V ∈ VAnd there is a mapping function for any connected edge
The weight of the edge between two adjacent nodes in the weighted abnormal graph G is determined by the corresponding operation information.
In step 3), a random walk sequence S of each node is constructedti1, 2., n, the sampling mode of the node is divided into two stages: the initial stage and the subsequent stage represent respectively the walk sequence StiLength of 0 to half element pathIn the migration stage and length betweenTo the migration phase between the longest migration step l.
Further, the walk probability of the initial stage of constructing the random walk sequence of each node is:
wherein,and vi+1∈Vt+1Respectively a current node and a next node,belongs to V for the current nodet+1A set of neighbor nodes of a type that,for meta-paths, φ () is a node type mapping function.
Further, the walk probability of the subsequent stage of the random walk sequence of each node is:
wherein,and vi+1∈Vt+1Respectively a current node and a next node,is the type of relationship with the current node and the next node, wiIs a relationship ofThe weight of the last edge of (c), β is the offset,for a set of neighbor nodes that are eligible,in order to be a meta-path,the function is mapped for edge type.
In step 4)In the method, the constructed language model is a Skip-gram model and is accelerated by using a negative sampling mode, and the number of negative samples of the negative sampling is fn;
The optimization function in the constructed Skip-gram model is as follows:
wherein v istFor given node v heterogeneous contextIn (3), theta is a parameter of the model, Xv,For nodes v and vtCorresponding low-dimensional node vector representation, XaIs a low-dimensional vector representation of any node in the graph.
Obtaining a dense vector representation in a low-dimensional space of nodes in the graph asWhere d is the vector dimension.
In step 6), the constructed fraud detection model is a classifier model, including a traditional machine learning model and a deep learning model.
Compared with the prior art, the invention has the following advantages and beneficial effects:
the invention captures richer structure and semantic relation by constructing a plurality of different composition graphs representing entity incidence relation in the mobile advertisement system; meanwhile, aiming at random walk of the meta-paths of a plurality of different composition graphs, the relationship between nodes with similar behaviors is tighter by adding weight constraint in the node propagation probability, so that the behavior information of the nodes can be better reflected by the vector obtained by embedding the graph, and the fraudulent mobile application can be effectively detected.
Drawings
FIG. 1 is a detailed flow chart of the method of the present invention.
FIG. 2 is a diagram of an all-rights heterogeneous graph.
Detailed Description
The present invention will be described in further detail with reference to examples and drawings, but the present invention is not limited thereto.
As shown in fig. 1, the method for detecting fraud in mobile advertisement based on heterogeneous graph embedding provided in this embodiment includes the specific steps of:
1) and acquiring mobile advertisement log data and preprocessing the data.
In this embodiment, the data preprocessing includes data cleaning and missing value filling; the mobile ad log data contains four attributes: a. unique identification attribute: a unique identifier of a user, application, advertisement, etc.; b. the time attribute is as follows: the user uses the application to operate the specific time of the advertisement, and the time is accurate to the second; c. position attribute: identifying the geographical location of the user, such as the country and city of the user, the IP address used by the user, and the like; d. the device attribute is as follows: the model of the device used by the user, the size of the display screen, the operating system, etc. For example, user a clicked on advertisement D on mobile application C using device B at a certain point in time.
2) Extracting the incidence relation data of users, applications and advertisements in the mobile advertisement ecosystem, and constructing a meta template corresponding to a weighted heterogeneous graph G ═ V, E, M-The heterogeneous graph of all rights is shown in figure 2.
In this embodimentThe weighted heterogeneous graph G comprises three types of nodes which are user nodes respectivelyApplication nodeAnd advertising node
Further, the weighted heterogeneous graph G includes three node relationships, which are respectively used by the user to applyUser operated advertisementApplication display advertisementIts corresponding meta templateIndicating that there is a mapping function for any node V ∈ VAnd there is a mapping function for any connected edge
Further, in the present invention,andrespectively represent a category set and a relation category set of edges and satisfy
Furthermore, the weight of the edge between two neighboring nodes in the weighted differential graph is determined by the corresponding operation information, i.e. the weight of the edge between two neighboring nodes is determined by the ratio of the number of operation actions to the total number of operation actions.
3) The meta path is defined as follows:
setting the number of wandering times of each node as 30 and the longest step length as 40, traversing the nodes in the authorized heterogeneous composition, constructing 30 authorized random wandering paths of each node, and finally obtaining a meta-path random wandering sequence of the authorized heterogeneous composition;
in the present embodiment, a random walk sequence S of each node is constructedvi1, 2., the sampling mode of the node in 30 is divided into two stages: an initial stage and a subsequent stage representing a walk stage in which the length of the walk sequence is between 0 and length 2 of a half-element path and a walk stage in which the length is between 2 and the longest walk step 40, respectively;
further, the walk probability of the initial walk stage of the random walk sequence for each node is constructed as follows:
wherein,and vi+1∈Vt+1Respectively a current node and a next node,belongs to V for the current nodet+1A set of neighbor nodes of a type that,for meta-paths, φ () is a node type mapping function.
Further, the walk probability of the subsequent stage of the random walk sequence of each node is:
wherein,and vi+1∈Vt+1Respectively a current node and a next node,is the type of relationship with the current node and the next node, wiIs a relationship ofThe weight of the last edge of (c), β is the offset,for a set of neighbor nodes that are eligible,in order to be a meta-path,the function is mapped for edge type.
4) And (4) constructing a language model, learning the low-dimensional dense vector representation of each mobile application node in the weighted abnormal graph, and constructing an input feature vector.
Furthermore, the constructed language model is a Skip-gram model and is accelerated by using a negative sampling mode, and the number of negative samples of the negative sampling is fnIn the present embodiment, negativeThe number of the sampled negative samples is 5;
the optimization function in the Skip-gram model is as follows:
wherein v istFor given node v heterogeneous contextIn (3), theta is a parameter of the model, Xv,For nodes v and vtCorresponding low-dimensional node vector representation, XaIs a low-dimensional vector representation of any node in the graph.
Finally, the dense vector of the nodes in the graph in the low-dimensional space is expressed asWhere d is the vector dimension.
5) Manually marking the mobile application of the training part, and setting a label value of each mobile application according to the information of whether the mobile application is a fraud application; the tag of the fraudulent application is set to 1 and the tag of the non-fraudulent application is set to 0, resulting in PtrainIndividual label dataPtrain<P,PtrainApplying a total number P η to the training part, and combining the total number P η with the corresponding input feature vector in the step (4) to form tested data;
in this example, η is 0.8.
6) A fraud detection model is constructed for detecting fraudulent mobile applications.
In this embodiment, the constructed fraud detection model is a random forest classifier model, and the main parameters of the model are as follows: the number of weak learners is 150, the maximum depth of each tree is 5, the minimum sample number of non-leaf node partition samples, namely leaf nodes, is 5, the out-of-bag score is used, the random state is set to be 10, the number of features is selected to be the square root of the number of original features, and the others are model default values.
7) And inputting the tested data into the fraud detection model, and acquiring parameters of the fraud detection model to obtain the mobile advertisement fraud detection model.
8) Inputting the input characteristics of the mobile application which is not marked into the mobile advertisement fraud detection model to detect the fraud application.
In the embodiment, the input characteristics of the target mobile application are input into the random forest model to obtain a real number py of 0-1, which represents the probability that the target mobile application is a fraud application. And setting the threshold value tau to be 0.5, if py is larger than tau, the target mobile application is a fraud application, and otherwise, the target mobile application is a normal application.
The above embodiments are preferred embodiments of the present invention, but the present invention is not limited to the above embodiments, and any other changes, modifications, substitutions, combinations, and simplifications which do not depart from the spirit and principle of the present invention should be construed as equivalents thereof, and all such changes, modifications, substitutions, combinations, and simplifications are intended to be included in the scope of the present invention.
Claims (8)
1. A mobile advertisement fraud detection method based on heterogeneous graph embedding is characterized by comprising the following steps:
1) acquiring mobile advertisement log data, and preprocessing the data;
2) extracting incidence relation data of users, applications and advertisements in the mobile advertisement ecosystem, and constructing an authorized heterogeneous graph and a meta template corresponding to the authorized heterogeneous graph Andrespectively represent a category set and a relation category set of edges and satisfy
3) Defining meta-pathsSetting the number of wandering times n and the longest step length l of each node, traversing the nodes in the weighted heterogeneous graph G, and constructing n weighted random wandering paths S of the nodes vv={Sv1,Sv2,...,SvnFourthly, finally obtaining an element path random walk sequence S with the right different composition G;
4) constructing a language model, and learning d-dimensional space dense vector representation X belonging to R in P mobile application nodes in the weighted abnormal graph GP ×dForming an input feature vector;
5) manually marking the mobile application of the training part, and setting a label value of each mobile application according to the information of whether the mobile application is a fraud application; the tag of the fraudulent application is set to 1 and the tag of the non-fraudulent application is set to 0, resulting in PtrainIndividual label dataPtrain<P,PtrainApplying a total number P η of floating point numbers smaller than 1 and larger than 0 to the training part, and combining the floating point numbers with the corresponding input feature vectors in the step 4) to form tested data;
6) constructing a fraud detection model for detecting fraudulent mobile applications;
7) inputting the tested data into a fraud detection model, and acquiring parameters of the fraud detection model to obtain a mobile advertisement fraud detection model;
8) inputting the input characteristics of the mobile application which is not marked into the mobile advertisement fraud detection model to detect the fraud application.
2. The mobile advertising fraud detection method based on heterogeneous graph embedding of claim 1, wherein in step 1), the data preprocessing includes data cleaning and missing value filling; the mobile ad log data contains four attributes: a. unique identification attribute: unique identifiers of users, applications, advertisements; b. the time attribute is as follows: the user uses the application to operate the specific time of the advertisement, and the time is accurate to the second; c. position attribute: identifying a geographic location at which the user is located; d. the device attribute is as follows: the model of the device used by the user, the size of the display screen, the operating system.
3. The method of claim 1, wherein the mobile advertising fraud detection method based on the heterogeneous graph embedding is characterized in that: in step 2), the authorized heterogeneous graph G comprises three types of nodes which are user nodes respectivelyApplication nodeAnd advertising node
The authorized different composition G comprises three node relations which are respectively used by usersUser operated advertisementApplication display advertisementIts corresponding meta templateIndicating that there is a mapping function for any node V ∈ VAnd there is a mapping function for any connected edge
The weight of the edge between two adjacent nodes in the weighted abnormal graph G is determined by the corresponding operation information.
4. The method of claim 1, wherein the mobile advertising fraud detection method based on the heterogeneous graph embedding is characterized in that: in step 3), a random walk sequence S of each node is constructedti1, 2., n, the sampling mode of the node is divided into two stages: the initial stage and the subsequent stage represent respectively the walk sequence StiLength of 0 to half element pathIn the migration stage and length betweenTo the migration phase between the longest migration step l.
5. The method of claim 4, wherein the mobile advertising fraud detection method based on the heterogeneous graph embedding is characterized in that: the wandering probability of the initial stage of constructing the random wandering sequence of each node is as follows:
wherein,and vi+1∈Vt+1Respectively a current node and a next node,belongs to V for the current nodet+1A set of neighbor nodes of a type that,for meta-paths, φ () is a node type mapping function.
6. The method of claim 4, wherein the mobile advertising fraud detection method based on the heterogeneous graph embedding is characterized in that: the walk probability of the subsequent stage of the random walk sequence of each node is:
wherein,and vi+1∈Vt+1Respectively a current node and a next node,is the type of relationship with the current node and the next node, wiIs a relationship ofThe weight of the last edge of (c), β is the offset,for a set of neighbor nodes that are eligible,in order to be a meta-path,the function is mapped for edge type.
7. The method for detecting fraud in mobile advertisement based on embedding of heterogeneous graph according to claim 1, characterized in that: in the step 4), the constructed language model is a Skip-gram model and is accelerated by using a negative sampling mode, and the number of negative samples of negative sampling is fn;
The optimization function of the constructed Skip-gram model is as follows:
wherein v istFor a given node v a heterogeneous context Nt(v),A node in (1); theta is a parameter of the model, Xv,For nodes v and vtA corresponding low-dimensional node vector representation; xaA vector representation of a low dimension of any node in the graph;
finally, the dense vector of the nodes in the graph in the low-dimensional space is expressed asWhere d is the vector dimension.
8. The method of claim 1, wherein the mobile advertising fraud detection method based on the heterogeneous graph embedding is characterized in that: in step 6), the constructed fraud detection model is a classifier model, including a traditional machine learning model and a deep learning model.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910417284.7A CN110189167B (en) | 2019-05-20 | 2019-05-20 | Mobile advertisement fraud detection method based on heterogeneous graph embedding |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910417284.7A CN110189167B (en) | 2019-05-20 | 2019-05-20 | Mobile advertisement fraud detection method based on heterogeneous graph embedding |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110189167A true CN110189167A (en) | 2019-08-30 |
CN110189167B CN110189167B (en) | 2021-06-08 |
Family
ID=67716841
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910417284.7A Active CN110189167B (en) | 2019-05-20 | 2019-05-20 | Mobile advertisement fraud detection method based on heterogeneous graph embedding |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110189167B (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110660019A (en) * | 2019-09-29 | 2020-01-07 | 华北电力大学 | Small data set simplified stroke generation method based on BPL |
CN110958220A (en) * | 2019-10-24 | 2020-04-03 | 中国科学院信息工程研究所 | Network space security threat detection method and system based on heterogeneous graph embedding |
CN112232834A (en) * | 2020-09-29 | 2021-01-15 | 中国银联股份有限公司 | Resource account determination method, device, equipment and medium |
CN112347260A (en) * | 2020-11-24 | 2021-02-09 | 深圳市欢太科技有限公司 | Data processing method and device and electronic equipment |
CN112767054A (en) * | 2021-01-29 | 2021-05-07 | 北京达佳互联信息技术有限公司 | Data recommendation method, device, server and computer-readable storage medium |
CN112995110A (en) * | 2019-12-17 | 2021-06-18 | 深信服科技股份有限公司 | Method and device for acquiring malicious event information and electronic equipment |
CN112988501A (en) * | 2019-12-17 | 2021-06-18 | 深信服科技股份有限公司 | Alarm information generation method and device, electronic equipment and storage medium |
CN113553446A (en) * | 2021-07-28 | 2021-10-26 | 厦门国际银行股份有限公司 | Financial anti-fraud method and device based on heteromorphic graph deconstruction |
CN113656797A (en) * | 2021-10-19 | 2021-11-16 | 航天宏康智能科技(北京)有限公司 | Behavior feature extraction method and behavior feature extraction device |
CN113706279A (en) * | 2021-06-02 | 2021-11-26 | 同盾科技有限公司 | Fraud analysis method and device, electronic equipment and storage medium |
CN114528479A (en) * | 2022-01-20 | 2022-05-24 | 华南理工大学 | Event detection method based on multi-scale different composition embedding algorithm |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120330751A1 (en) * | 2008-06-06 | 2012-12-27 | Oracle International Corporation | Crm system for enhanced retention of customers |
US20170132636A1 (en) * | 2015-11-11 | 2017-05-11 | Idm Global, Inc. | Systems and methods for detecting relations between unknown merchants and merchants with a known connection to fraud |
EP3239919A1 (en) * | 2008-03-05 | 2017-11-01 | eBay Inc. | Method and apparatus for image recognition services |
CN109472626A (en) * | 2018-11-26 | 2019-03-15 | 浙江大学 | A kind of intelligent finance risk control method and system towards mobile phone charter business |
-
2019
- 2019-05-20 CN CN201910417284.7A patent/CN110189167B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3239919A1 (en) * | 2008-03-05 | 2017-11-01 | eBay Inc. | Method and apparatus for image recognition services |
US20120330751A1 (en) * | 2008-06-06 | 2012-12-27 | Oracle International Corporation | Crm system for enhanced retention of customers |
US20170132636A1 (en) * | 2015-11-11 | 2017-05-11 | Idm Global, Inc. | Systems and methods for detecting relations between unknown merchants and merchants with a known connection to fraud |
CN109472626A (en) * | 2018-11-26 | 2019-03-15 | 浙江大学 | A kind of intelligent finance risk control method and system towards mobile phone charter business |
Non-Patent Citations (2)
Title |
---|
FENG YAN-HONG 等: "Domain Named Entity Recognition Method Based on Skip-gram Model", 《2017 FIRST INTERNATIONAL CONFERENCE ON ELECTRONICS INSTRUMENTATION & INFORMATION SYSTEMS (EIIS)》 * |
张宝明: "基于Structure2vec算法的网络欺诈", 《软件导刊》 * |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110660019A (en) * | 2019-09-29 | 2020-01-07 | 华北电力大学 | Small data set simplified stroke generation method based on BPL |
CN110958220A (en) * | 2019-10-24 | 2020-04-03 | 中国科学院信息工程研究所 | Network space security threat detection method and system based on heterogeneous graph embedding |
CN110958220B (en) * | 2019-10-24 | 2020-12-29 | 中国科学院信息工程研究所 | Network space security threat detection method and system based on heterogeneous graph embedding |
WO2021077642A1 (en) * | 2019-10-24 | 2021-04-29 | 中国科学院信息工程研究所 | Network space security threat detection method and system based on heterogeneous graph embedding |
WO2021121244A1 (en) * | 2019-12-17 | 2021-06-24 | 深信服科技股份有限公司 | Alarm information generation method and apparatus, electronic device, and storage medium |
CN112995110A (en) * | 2019-12-17 | 2021-06-18 | 深信服科技股份有限公司 | Method and device for acquiring malicious event information and electronic equipment |
CN112988501A (en) * | 2019-12-17 | 2021-06-18 | 深信服科技股份有限公司 | Alarm information generation method and device, electronic equipment and storage medium |
CN112232834A (en) * | 2020-09-29 | 2021-01-15 | 中国银联股份有限公司 | Resource account determination method, device, equipment and medium |
CN112232834B (en) * | 2020-09-29 | 2024-04-26 | 中国银联股份有限公司 | Resource account determination method, device, equipment and medium |
CN112347260A (en) * | 2020-11-24 | 2021-02-09 | 深圳市欢太科技有限公司 | Data processing method and device and electronic equipment |
CN112767054A (en) * | 2021-01-29 | 2021-05-07 | 北京达佳互联信息技术有限公司 | Data recommendation method, device, server and computer-readable storage medium |
CN113706279A (en) * | 2021-06-02 | 2021-11-26 | 同盾科技有限公司 | Fraud analysis method and device, electronic equipment and storage medium |
CN113706279B (en) * | 2021-06-02 | 2024-04-05 | 同盾科技有限公司 | Fraud analysis method, fraud analysis device, electronic equipment and storage medium |
CN113553446A (en) * | 2021-07-28 | 2021-10-26 | 厦门国际银行股份有限公司 | Financial anti-fraud method and device based on heteromorphic graph deconstruction |
CN113553446B (en) * | 2021-07-28 | 2022-05-24 | 厦门国际银行股份有限公司 | Financial anti-fraud method and device based on heterograph deconstruction |
CN113656797A (en) * | 2021-10-19 | 2021-11-16 | 航天宏康智能科技(北京)有限公司 | Behavior feature extraction method and behavior feature extraction device |
CN113656797B (en) * | 2021-10-19 | 2021-12-21 | 航天宏康智能科技(北京)有限公司 | Behavior feature extraction method and behavior feature extraction device |
CN114528479A (en) * | 2022-01-20 | 2022-05-24 | 华南理工大学 | Event detection method based on multi-scale different composition embedding algorithm |
CN114528479B (en) * | 2022-01-20 | 2023-03-21 | 华南理工大学 | Event detection method based on multi-scale heteromorphic image embedding algorithm |
Also Published As
Publication number | Publication date |
---|---|
CN110189167B (en) | 2021-06-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110189167B (en) | Mobile advertisement fraud detection method based on heterogeneous graph embedding | |
CN110223106B (en) | Deep learning-based fraud application detection method | |
Li et al. | Rhythmic brushstrokes distinguish van Gogh from his contemporaries: findings via automated brushstroke extraction | |
CN101315663B (en) | Nature scene image classification method based on area dormant semantic characteristic | |
CN109726744A (en) | A kind of net flow assorted method | |
CN110287334A (en) | A kind of school's domain knowledge map construction method based on Entity recognition and attribute extraction model | |
CN110427990A (en) | A kind of art pattern classification method based on convolutional neural networks | |
CN104778470B (en) | Text detection based on component tree and Hough forest and recognition methods | |
CN111008337B (en) | Deep attention rumor identification method and device based on ternary characteristics | |
CN109492026A (en) | A kind of Telecoms Fraud classification and Detection method based on improved active learning techniques | |
Li et al. | Polygon-based approach for extracting multilane roads from OpenStreetMap urban road networks | |
CN103970733B (en) | A kind of Chinese new word identification method based on graph structure | |
CN109816032A (en) | Zero sample classification method and apparatus of unbiased mapping based on production confrontation network | |
CN105760439A (en) | Figure cooccurrence relation graph establishing method based on specific behavior cooccurrence network | |
CN113364748B (en) | Ether house phishing node detection method and system based on transaction subgraph network | |
CN108763496A (en) | A kind of sound state data fusion client segmentation algorithm based on grid and density | |
CN110287329A (en) | A kind of electric business classification attribute excavation method based on commodity text classification | |
CN102385592A (en) | Image concept detection method and device | |
CN106875278A (en) | Social network user portrait method based on random forest | |
CN111680506A (en) | External key mapping method and device of database table, electronic equipment and storage medium | |
CN109325510A (en) | A kind of image characteristic point matching method based on lattice statistical | |
CN114120094A (en) | Water pollution identification method and system based on artificial intelligence | |
CN111291818B (en) | Non-uniform class sample equalization method for cloud mask | |
CN113822277B (en) | Illegal advertisement picture detection method and system based on deep learning target detection | |
CN115238773A (en) | Malicious account detection method and device for heterogeneous primitive path automatic evaluation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |