[go: up one dir, main page]

CN117575596B - Fraud analysis method based on artificial intelligence and digital financial big data system - Google Patents

Fraud analysis method based on artificial intelligence and digital financial big data system Download PDF

Info

Publication number
CN117575596B
CN117575596B CN202311141405.2A CN202311141405A CN117575596B CN 117575596 B CN117575596 B CN 117575596B CN 202311141405 A CN202311141405 A CN 202311141405A CN 117575596 B CN117575596 B CN 117575596B
Authority
CN
China
Prior art keywords
user behavior
fraud
vector
behavior data
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311141405.2A
Other languages
Chinese (zh)
Other versions
CN117575596A (en
Inventor
李建军
陈伟航
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiongju Digital Technology Zhejiang Co ltd
Original Assignee
Xiongju Digital Technology Zhejiang Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiongju Digital Technology Zhejiang Co ltd filed Critical Xiongju Digital Technology Zhejiang Co ltd
Priority to CN202311141405.2A priority Critical patent/CN117575596B/en
Publication of CN117575596A publication Critical patent/CN117575596A/en
Application granted granted Critical
Publication of CN117575596B publication Critical patent/CN117575596B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/36Creation of semantic tools, e.g. ontology or thesauri
    • G06F16/367Ontology
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • G06N3/084Backpropagation, e.g. using gradient descent
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Computational Linguistics (AREA)
  • Marketing (AREA)
  • Biomedical Technology (AREA)
  • Animal Behavior & Ethology (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Databases & Information Systems (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Health & Medical Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Computer Security & Cryptography (AREA)
  • Biophysics (AREA)
  • Evolutionary Computation (AREA)
  • General Health & Medical Sciences (AREA)
  • Molecular Biology (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Software Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the application provides an artificial intelligence-based fraud analysis method and a digital financial big data system, which are characterized in that a first fraud tag value estimation strategy is carried out on user behavior directed graph data of a target financial service user to obtain a first fraud tag value of the target financial service user, and the estimated performance value of the first fraud tag value estimation strategy is higher than that of a second fraud tag value estimation strategy, so that the estimated performance value of the fraud tag value estimation strategy is improved, fraud tag deviation value estimation is carried out on the user behavior directed graph data of the target financial service user through a fraud analysis neural network to obtain a fraud tag deviation value of the target financial service user, and deviation value optimization is carried out on the determined first fraud tag value according to the fraud tag deviation value to obtain a second fraud tag value of the target financial service user.

Description

Fraud analysis method based on artificial intelligence and digital financial big data system
Technical Field
The application relates to the technical field of artificial intelligence, in particular to an artificial intelligence-based fraud analysis method and a digital financial big data system.
Background
Digital finance refers to innovative financial products, business modes, technical application and business processes by utilizing technological methods such as a large-technology platform, large data and cloud computing, and is in face of high-speed development of financial technology, and the customer demands are changeable and the product iteration upgrade becomes a new normal state. According to the needs of the times development, each digital financial service platform actively promotes the innovation of financial science and technology, accelerates the application of technologies such as big data, cloud computing and the like, accelerates the digital transformation, and maximizes the advantages of digital financial services in the aspects of asset management, credit management, payment exchange and the like. However, in the process of providing the digital financial and technical service, there are also many fraudulent users to implement financial fraud through various fraudulent activities, and how to identify these fraudulent users is a technical problem to be solved by the digital financial and technical service platform. For example, in the related art, the user behavior data of the related user is analyzed by combining with the neural network model based on artificial intelligence, so as to predict the fraud tag value (which can also be understood as a fraud risk value) of the related user, however, the accuracy and the speed of predicting the fraud tag value of the related user cannot be considered in the related art.
Disclosure of Invention
In order to at least overcome the above-mentioned shortcomings in the prior art, an object of an embodiment of the present application is to provide an artificial intelligence-based fraud analysis method and a digital financial big data system.
In a first aspect, an embodiment of the present application provides an artificial intelligence based fraud analysis method applied to a digital financial big data system, the method including:
Acquiring user behavior directed graph data of a target financial service user;
Based on the fraud analysis neural network, fraud label deviation value estimation is carried out on the user behavior directed graph data of the target financial service user, so as to obtain fraud label deviation values of the target financial service user; the fraud analysis neural network is generated by updating network weight parameters by combining fraud tag deviation values of template user behavior directed graph data, wherein the fraud tag deviation values of the template user behavior directed graph data are used for representing fraud tag loss values obtained when fraud tag values of the template user behavior directed graph data are calculated according to two fraud tag value estimation strategies respectively, the two fraud tag value estimation strategies comprise a first fraud tag value estimation strategy and a second fraud tag value estimation strategy, the accuracy score of the first fraud tag value estimation strategy is smaller than the accuracy score of the second fraud tag value estimation strategy, and the estimated performance value of the first fraud tag value estimation strategy is larger than the estimated performance value of the second fraud tag value estimation strategy;
Performing the first fraud tag value estimation strategy on the user behavior directed graph data of the target financial service user to obtain a first fraud tag value of the target financial service user;
and optimizing the deviation value of the first fraud tag value of the target financial service user according to the fraud tag deviation value of the target financial service user to obtain a second fraud tag value of the target financial service user.
In a possible implementation manner of the first aspect, the fraud tag bias value estimating, by the fraud analysis neural network, the user behavior directed graph data of the target financial service user, to obtain a fraud tag bias value of the target financial service user includes:
performing fraud vector description on the user behavior directed graph data based on the fraud analysis neural network to obtain fraud label deviation vectors of the target financial service users;
And estimating the fraud tag deviation value of the fraud tag deviation vector based on the fraud analysis neural network to obtain the fraud tag deviation value of the target financial service user.
In a possible implementation manner of the first aspect, the fraud analysis neural network includes K fraud knowledge description units connected in sequence, and the fraud vector description is performed on the user behavior directed graph data based on the fraud analysis neural network to obtain a fraud tag deviation vector of the target financial service user, including:
Performing basic fraud knowledge vector description on each user behavior data in the user behavior directed graph data to obtain basic fraud knowledge vectors of each user behavior data;
responding K is 1-K-2, carrying out kth fraud vector description on the loading data of kth fraud knowledge description units based on kth fraud knowledge description units in K fraud knowledge description units which are connected in sequence, obtaining kth fraud knowledge vectors of the user behavior data, and loading the kth fraud knowledge vectors to the kth+1 fraud knowledge description units to continue the kth+1 fraud vector description;
Responding K to K-1, carrying out fraud time domain vector extraction on the kth fraud knowledge vector of each user behavior data based on the kth+1 fraud knowledge description unit to obtain the kth+1 fraud time domain vector of each user behavior data, carrying out fraud space vector extraction on the kth fraud knowledge vector of each user behavior data based on the kth+1 fraud knowledge description unit to obtain the kth+1 fraud space vector of each user behavior data, and forming the kth+1 fraud time domain vector and the kth+1 fraud space vector of each user behavior data into the fraud tag deviation vector;
Wherein K is more than or equal to 2 and is a positive integer which is gradually increased by 1, and K is more than or equal to 1 and is less than or equal to K-1; and when K is 1, the loading data of the kth fraud knowledge description unit is a basic fraud knowledge vector of the behavior data of each user, and when K is 2-K-1, the loading data of the kth fraud knowledge description unit is a kth-1 fraud knowledge vector of the behavior data of each user output by the kth-1 fraud knowledge description unit.
In a possible implementation manner of the first aspect, the performing a basic fraud knowledge vector description on each user behavior data in the user behavior directed graph data to obtain a basic fraud knowledge vector of each user behavior data includes:
Acquiring basic fraud time domain vectors of all user behavior data in the user behavior directed graph data, and acquiring basic fraud airspace vectors of all user behavior data in the user behavior directed graph data; the basic fraud time domain vector is used for reflecting a time sequence vector of the user behavior data, and the basic fraud airspace vector is used for reflecting a space sequence vector of the user behavior data;
the following steps are executed for each piece of user behavior data in the user behavior directed graph data:
Acquiring at least one other user behavior data except the user behavior data in the user behavior directed graph data, and acquiring an initial directed path relation between the user behavior data and each other user behavior data, wherein the initial directed path relation is used for reflecting the behavior flow direction relation between the user behavior data and the other user behavior data;
And forming basic fraud knowledge vectors of the user behavior data by the basic fraud time domain vectors of the user behavior data, the basic fraud airspace vectors of the user behavior data and the initial directed path relation of the user behavior data.
In a possible implementation manner of the first aspect, the K-th fraud knowledge description unit according to the K-th fraud knowledge description units connected in sequence performs a K-th fraud vector description on the loading data of the K-th fraud knowledge description unit to obtain a K-th fraud knowledge vector of each user behavior data, including:
performing the following steps for each of the user behavior data based on the kth fraud knowledge description unit: acquiring other user behavior data except the user behavior data in the user behavior directed graph data;
performing a first vector mapping on a kth-1 fraudulent knowledge vector of the user behavior data and a kth-1 fraudulent knowledge vector of each other user behavior data to obtain a kth directed relation vector of each other user behavior data corresponding to the user behavior data;
and performing second vector mapping on the kth-1 fraudulent knowledge vector of the user behavior data and the kth directed relation vector of the user behavior data corresponding to each other user behavior data to obtain the kth fraudulent knowledge vector of the user behavior data.
In a possible implementation manner of the first aspect, the performing a first vector mapping on the kth-1 fraudulent knowledge vector of the user behavior data and the kth-1 fraudulent knowledge vector of each of the other user behavior data to obtain a kth directional relation vector of the user behavior data corresponding to each of the other user behavior data includes:
Extracting a kth-1 fraudulent airspace vector of the user behavior data, a kth-1 fraudulent time domain vector of the user behavior data, and a kth-1 directed path relationship of the user behavior data from a kth-1 fraudulent knowledge vector of the user behavior data;
Extracting a kth-1 fraudulent spatial vector of each of the other user behavior data and a kth-1 fraudulent time domain vector of each of the other user behavior data from a kth-1 fraudulent knowledge vector of each of the other user behavior data;
the following steps are performed for each of the other user behavior data:
extracting a kth-1 directed path relation of the user behavior data for the other user behavior data from the kth-1 directed path relation of the user behavior data;
acquiring a first vector distance between a kth-1 fraudulent airspace vector of the user behavior data and a kth-1 fraudulent airspace vector of the other user behavior data;
and performing first vector fusion on the square of the first vector distance, the k-1 fraud time domain vector of the user behavior data, the k-1 fraud time domain vector of the other user behavior data and the k-1 directed path relation of the user behavior data to the other user behavior data to obtain the k directed relation vector of the user behavior data corresponding to the other user behavior data.
In a possible implementation manner of the first aspect, the performing the second vector mapping on the kth-1 fraudulent knowledge vector of the user behavior data and the kth directional relation vector of the user behavior data corresponding to each of the other user behavior data to obtain the kth fraudulent knowledge vector of the user behavior data includes:
Fusing the kth directed relation vector of the user behavior data corresponding to a plurality of other user behavior data to obtain the kth directed relation vector of the user behavior data;
performing second vector fusion on the kth-1 fraudulent time domain vector of the user behavior data and the kth directed relation vector of the user behavior data to obtain the kth fraudulent time domain vector of the user behavior data;
Acquiring a first vector distance between a kth-1 fraudulent airspace vector of the user behavior data and a kth-1 fraudulent airspace vector of each other user behavior data;
Vector mapping is carried out on the kth directed relation vector of the user behavior data corresponding to each other user behavior data, and behavior influence coefficients of each other user behavior data are obtained;
According to the behavior influence coefficients of the other user behavior data, performing weight fusion calculation on the first vector distances of the plurality of other user behavior data to obtain fusion calculation data corresponding to the user behavior data;
Fusing the fused calculation data of the user behavior data with the k-1 fraudulent airspace vector of the user behavior data to obtain the k fraudulent airspace vector of the user behavior data;
And taking the initial directed path relation of the user behavior data as a kth directed path relation of the user behavior data, and forming a kth fraud knowledge vector of the user behavior data by the kth directed path relation of the user behavior data, a kth fraud time domain vector of the user behavior data and a kth fraud space vector of the user behavior data.
In a possible implementation manner of the first aspect, the performing, by the k+1-th fraud knowledge description unit, fraud time domain vector extraction on the k-th fraud knowledge vector of each of the user behavior data to obtain a k+1-th fraud time domain vector of each of the user behavior data includes:
Extracting a kth fraud airspace vector of the user behavior data, a kth fraud time domain vector of the user behavior data and a kth directed path relation of the user behavior data from kth fraud knowledge vectors of the user behavior data;
For each piece of user behavior data, acquiring other pieces of user behavior data except the user behavior data in the user behavior directed graph data, and executing the following steps for each piece of other pieces of user behavior data:
Extracting a kth directed path relation of the user behavior data aiming at the other user behavior data from the kth directed path relation of the user behavior data, and acquiring a second vector distance between a kth fraudulent airspace vector of the user behavior data and a kth fraudulent airspace vector of the other user behavior data;
Performing a first vector fusion on the square of the second vector distance, a kth fraud time domain vector of the user behavior data, a kth fraud time domain vector of the other user behavior data, and a kth directed path relation of the user behavior data with respect to the other user behavior data to obtain a kth+1 directed relation vector of the user behavior data corresponding to the other user behavior data;
Fusing the k+1th directional relation vector of the user behavior data corresponding to a plurality of other user behavior data to obtain the k+1th directional relation vector of the user behavior data;
and carrying out second vector fusion on the kth fraud time domain vector of the user behavior data and the kth+1 directional relation vector of the user behavior data to obtain the kth+1 fraud time domain vector of the user behavior data.
In a possible implementation manner of the first aspect, before performing fraud tag bias value estimation on the user behavior directed graph data of the target financial service user based on the fraud analysis neural network to obtain a fraud tag bias value of the target financial service user, the method further includes:
Acquiring template user behavior directed graph data, and performing feature derivation on the template user behavior directed graph data to acquire a plurality of template derived behavior directed graph data;
acquiring fraud tag deviation labeling values of the template derived behavior directed graph data;
forward transmitting each template-derived behavior directed graph data in an initial fraud analysis neural network to obtain fraud label deviation prediction values of each template-derived behavior directed graph data;
Determining global training cost values according to the fraud tag deviation labeling values of the template-derived behavior directed graph data and the fraud tag deviation predicting values of the template-derived behavior directed graph data;
Performing back propagation processing on the global training cost value in the initial fraud analysis neural network to obtain network weight updating information of the initial fraud analysis neural network when the global training cost value converges, and updating the network weight information of the initial fraud analysis neural network according to the network weight updating information;
the obtaining the fraud tag deviation labeling value of each template derived behavior directed graph data comprises the following steps:
the following steps are executed for each template derived behavior directed graph data:
Performing a first fraud tag value estimation strategy on the template-derived behavior directed graph data to obtain a first fraud tag value of the template-derived behavior directed graph data; performing a second fraud tag value estimation strategy on the template-derived behavior directed graph data to obtain a second fraud tag value of the template-derived behavior directed graph data;
Acquiring a first loss value between a second fraud tag value of the template-derived behavior directed graph data and a first fraud tag value of the template-derived behavior directed graph data as a fraud tag deviation labeling value of the template-derived behavior directed graph data;
the determining the global training cost value according to the fraud tag deviation labeling value of each template derived behavior directed graph data and the fraud tag deviation predicting value of each template derived behavior directed graph data comprises the following steps:
the following steps are executed for each template derived behavior directed graph data:
Determining a first root mean square loss value of the template-derived behavior directed graph data according to the fraud tag deviation labeling value of the template-derived behavior directed graph data and the fraud tag deviation predicting value of the template-derived behavior directed graph data;
acquiring other template-derived behavior directed graph data except for the template-derived behavior directed graph data of the template user behavior directed graph data;
The following steps are performed for each of the other template-derived behavioral directed graph data: determining a second loss value between the fraud tag deviation labeling value of the template-derived directed graph data and the fraud tag deviation labeling value of the other template-derived directed graph data, and determining a third loss value between the fraud tag deviation prediction value of the template-derived directed graph data and the fraud tag deviation prediction value of the other template-derived directed graph data;
performing root mean square calculation on the second loss value and the third loss value to obtain a second root mean square loss value of the other template-derived behavior directed graph data corresponding to the template-derived behavior directed graph data;
Fusing the second root mean square loss values of the template-derived behavior directed graph data corresponding to a plurality of other template-derived behavior directed graph data to obtain a third root mean square loss value of the template-derived behavior directed graph data;
and carrying out third vector fusion on the first root mean square loss values of the plurality of template-derived behavior directed graph data and the third root mean square loss values of the plurality of template-derived behavior directed graph data to obtain global training cost values corresponding to the fraud analysis neural network.
In a second aspect, an embodiment of the present application further provides an artificial intelligence-based fraud analysis system, where the artificial intelligence-based fraud analysis system includes a digital financial big data system and a plurality of digital financial service terminals communicatively connected to the digital financial big data system;
the digital financial big data system is used for:
Acquiring user behavior directed graph data of a target financial service user;
Based on the fraud analysis neural network, fraud label deviation value estimation is carried out on the user behavior directed graph data of the target financial service user, so as to obtain fraud label deviation values of the target financial service user; the fraud analysis neural network is generated by updating network weight parameters by combining fraud tag deviation values of template user behavior directed graph data, wherein the fraud tag deviation values of the template user behavior directed graph data are used for representing fraud tag loss values obtained when fraud tag values of the template user behavior directed graph data are calculated according to two fraud tag value estimation strategies respectively, the two fraud tag value estimation strategies comprise a first fraud tag value estimation strategy and a second fraud tag value estimation strategy, the accuracy score of the first fraud tag value estimation strategy is smaller than the accuracy score of the second fraud tag value estimation strategy, and the estimated performance value of the first fraud tag value estimation strategy is larger than the estimated performance value of the second fraud tag value estimation strategy;
Performing the first fraud tag value estimation strategy on the user behavior directed graph data of the target financial service user to obtain a first fraud tag value of the target financial service user;
and optimizing the deviation value of the first fraud tag value of the target financial service user according to the fraud tag deviation value of the target financial service user to obtain a second fraud tag value of the target financial service user.
In a third aspect, embodiments of the present application also provide a digital financial big data system comprising a processor and a machine-readable storage medium having stored therein a computer program loaded and executed in conjunction with the processor to implement the artificial intelligence based fraud analysis method of the first aspect above.
In a fourth aspect, embodiments of the present application provide a computer readable storage medium storing computer executable instructions for execution by a processor to implement the artificial intelligence based fraud analysis method of the first aspect above.
In a fifth aspect, embodiments of the present application provide a computer program product comprising a computer program or computer executable instructions which, when executed by a processor, implement the artificial intelligence based fraud analysis method of the first aspect above.
The embodiment of the application has at least the following beneficial effects:
The first fraud tag value of the target financial service user is obtained by carrying out a first fraud tag value estimation strategy on the user behavior directed graph data of the target financial service user, and the estimated performance value of the first fraud tag value estimation strategy is higher than that of the second fraud tag value estimation strategy, so that the estimated performance value of the fraud tag value estimation strategy is improved, the user behavior directed graph data of the target financial service user is subjected to fraud tag deviation value estimation through a fraud behavior analysis neural network, the fraud tag deviation value of the target financial service user is obtained, and the determined first fraud tag value is subjected to deviation value optimization according to the fraud tag deviation value, so that the second fraud tag value of the target financial service user is obtained.
Drawings
Fig. 1 is a schematic flow chart of an artificial intelligence-based fraud analysis method according to an embodiment of the present application.
Detailed Description
The present application will be further described in detail with reference to the accompanying drawings, for the purpose of making the objects, technical solutions and advantages of the present application more apparent, and the described embodiments should not be construed as limiting the present application, and all other embodiments obtained by those skilled in the art without making any inventive effort are within the scope of the present application.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The terminology used in the embodiments of the application is for the purpose of describing embodiments of the application only and is not intended to be limiting of the application.
It should be noted that, all kinds of data obtained in the following embodiments are obtained on the basis of obtaining the authorized license of the user.
See fig. 1:
In step S101, user behavior directed graph data of a target financial service user is acquired.
In an alternative embodiment, the target financial service user includes at least one user behavior data, and for the target financial service user having a plurality of user behavior data, the user behavior directed graph data is a knowledge graph structure formed by the plurality of user behavior data and at least one user behavior directed relationship (a behavior a trigger relationship, a behavior linkage relationship, etc.).
In step S102, the fraud tag deviation value estimation is performed on the user behavior directed graph data of the target financial service user based on the fraud behavior analysis neural network, and the fraud tag deviation value of the target financial service user is obtained.
In an alternative embodiment, the fraud vector description is performed on the user behavior directed graph data of the target financial service user by means of a fraud analysis neural network, a fraud tag deviation vector is obtained, and the fraud tag deviation vector is mapped to a fraud tag loss value obtained when the fraud tag value calculation is performed on the target financial service user by means of two preset fraud tag value estimation strategies, the fraud analysis neural network is based on the vector mapping, and the fraud tag deviation value is obtained in combination, the fraud tag value calculation is not actually performed on the target financial service user by means of two given fraud tag value estimation strategies, because the functions that can be implemented by the fraud analysis neural network depend on the network learning mode, the fraud analysis neural network is generated by performing the network weight parameter update in combination with the fraud tag deviation value of the fraud template user behavior directed graph data, the fraud tag deviation value of the template user behavior directed graph data refers to a fraud tag loss value obtained when fraud tag values of the template user behavior directed graph data are calculated according to two fraud tag value estimation strategies respectively, the fraud tag value estimation strategies are used for reflecting a mode of carrying out fraud tag value calculation on given user behavior directed graph data, the two fraud tag value estimation strategies comprise a first fraud tag value estimation strategy and a second fraud tag value estimation strategy, the accuracy score of the first fraud tag value estimation strategy is smaller than that of the second fraud tag value estimation strategy, and the estimated performance value of the first fraud tag value estimation strategy is larger than that of the second fraud tag value estimation strategy.
In step S103, a first fraud tag value estimation policy is performed on the user behavior directed graph data of the target financial service user, to obtain a first fraud tag value of the target financial service user.
In step S104, the bias value optimization is performed on the first bias value of the target financial service user according to the bias value of the bias label of the target financial service user, so as to obtain the second bias value of the bias label of the target financial service user.
In an alternative embodiment, the bias value optimization refers to adding or subtracting the first fraud tag value and the fraud tag bias value, when the fraud tag bias value is used to reflect a fraud tag loss value between the first fraud tag value estimation policy and the second fraud tag value estimation policy, the bias value optimization is to subtract the first fraud tag value and the fraud tag bias value to obtain a second fraud tag value for the target financial service user, and when the fraud tag bias value is used to reflect a fraud tag loss value between the second fraud tag value estimation policy and the first fraud tag value estimation policy, the bias value optimization is to add the first fraud tag value and the fraud tag bias value to obtain a second fraud tag value for the target financial service user.
In an alternative embodiment, the fraud tag deviation value estimation performed on the user behavior directed graph data of the target financial service user based on the fraud analysis neural network in step S102, and obtaining the fraud tag deviation value of the target financial service user may be implemented in steps S1021 to S1022 described below.
In step S1021, the user behavior directed graph data is subjected to fraud vector description through the fraud analysis neural network, and a fraud tag deviation vector of the target financial service user is obtained.
In step S1022, the fraud tag bias vector is subjected to fraud tag bias value estimation by the fraud analysis neural network, and a fraud tag bias value of the target financial service user is obtained.
The fraud tag deviation vector of the user behavior directed graph data is extracted, and the fraud tag deviation value of the target financial service user is predicted according to the fraud tag deviation vector, so that the fraud tag loss value of the fraud tag value of the user behavior directed graph data of the target financial service user can be calculated by combining two fraud tag value estimation strategies.
In an alternative embodiment, the fraud analysis neural network includes K fraud knowledge description units connected in sequence, and in step S1021, fraud vector description is performed on the user behavior directed graph data by the fraud analysis neural network, so as to obtain a fraud tag deviation vector of the target financial service user, which may be implemented based on the following steps a to C.
In the step A, basic fraud knowledge vector description is carried out on each user behavior data in the user behavior directed graph data, and basic fraud knowledge vectors of each user behavior data are obtained.
In an alternative embodiment, when the target financial service user E includes three user behavior data (user behavior data a, user behavior data B, and user behavior data C) and one behavior directed relationship (the user behavior data a and the user behavior data B are connected by the behavior directed relationship), basic fraud knowledge vector description is performed for each user behavior data, a basic fraud time domain vector of each user behavior data in the user behavior directed graph data is obtained, the basic fraud time domain vector is used for reflecting a time sequence vector of the user behavior data, and a basic fraud airspace vector of each user behavior data in the user behavior directed graph data is obtained, and the basic fraud airspace vector is used for reflecting a spatial sequence vector of the user behavior data. The following steps are performed for each user behavior data in the user behavior directed graph data, for example, the following steps are performed for the user behavior data a: obtaining at least one other user behavior data (namely user behavior data B and user behavior data C) except the user behavior data A in the user behavior directed graph data, obtaining an initial directed path relation between the user behavior data and each other user behavior data, wherein the initial directed path relation is used for reflecting a behavior flow direction relation between the user behavior data and the other user behavior data, the initial directed path relation is used for reflecting a behavior flow direction relation between the user behavior data A and the user behavior data B and a behavior flow direction relation between the user behavior data A and the user behavior data C, two behavior flow direction relations exist, and a behavior flow direction relation and a no behavior flow direction relation, if the two user behavior data are connected through the behavior directed relation, the two user behavior data have the behavior flow direction relation, and if the two user behavior data are not connected through the behavior directed relation, the basic fraud time domain vector of each user behavior data, the basic fraud vector of each user behavior data and the initial directed path relation of each user behavior data form the basic fraud time domain vector of each user behavior data.
The basic fraud time domain vector, the initial directed path relationship and the basic fraud airspace vector are formed into a basic fraud knowledge vector, which not only can be used for reflecting the behavior category of the user behavior data, but also can be used for reflecting the relative behavior node of the user behavior data and the connection condition of the directed relationship through behavior, thereby effectively improving the characteristic expression capability of the basic fraud knowledge vector.
In the step B, when K is 1-K-2, carrying out kth fraud vector description on the loading data of the kth fraud knowledge description unit based on the kth fraud knowledge description unit in the K fraud knowledge description units which are connected in sequence to obtain kth fraud knowledge vectors of all user behavior data, and loading the kth fraud knowledge vectors to the kth+1 fraud knowledge description unit to continue carrying out kth+1 fraud vector description.
In an alternative embodiment, K is 2.ltoreq.K, K is a positive integer with a value gradually increasing from 1, and K is 1.ltoreq.k-1; and when K is 1, the loading data of the kth fraud knowledge description unit is a basic fraud knowledge vector of the behavior data of each user, and when K is 2-K-1, the loading data of the kth fraud knowledge description unit is a kth-1 fraud knowledge vector of the behavior data of each user output by the kth-1 fraud knowledge description unit.
In an alternative embodiment, assuming that K has a value of 3, the following steps are still performed taking the user behavior data a as an example: and carrying out 1 st fraud vector description on the basic fraud knowledge vector of the user behavior data A through a1 st fraud knowledge description unit to obtain a1 st fraud knowledge vector of the user behavior data A, loading the 1 st fraud knowledge vector into a 2 nd fraud knowledge description unit to continue carrying out 2 nd fraud vector description, and carrying out 2 nd fraud vector description on the 1 st fraud knowledge vector of the user behavior data A through the 2 nd fraud knowledge description unit to obtain a 2 nd vector of the user behavior data A.
In step C, in response to K being K-1, the k+1-th fraud knowledge description unit is used for carrying out fraud time domain vector extraction on the K-th fraud knowledge vector of each user behavior data to obtain the k+1-th fraud time domain vector of each user behavior data, the k+1-th fraud knowledge vector of each user behavior data is used for carrying out fraud space domain vector extraction on the K-th fraud knowledge vector of each user behavior data to obtain the k+1-th fraud space domain vector of each user behavior data, and the k+1-th fraud time domain vector and the k+1-th fraud space domain vector of each user behavior data are combined into a fraud tag deviation vector.
In an alternative embodiment, assuming that K has a value of 3, the following steps are still performed taking the user behavior data a as an example: and 3 rd fraudulent time domain vector extraction is carried out on the 2 nd vector of the user behavior data A through a 3 rd fraudulent knowledge description unit, the 3 rd fraudulent time domain vector of the user behavior data A is obtained, 3 rd fraudulent space vector extraction is carried out on the 2 nd vector of the user behavior data A through the 3 rd fraudulent knowledge description unit, the 3 rd fraudulent space vector of the user behavior data A is obtained, and the 3 rd fraudulent time domain vector of the user behavior data A and the 3 rd fraudulent space vector of the user behavior data A are used as fraud tag deviation vectors.
The fraudulent airspace vector of each user behavior data and the fraudulent time domain vector of each user behavior data can be obtained through iteration steps, and then the fraudulent airspace vectors of a plurality of user behavior data and the fraudulent time domain vectors of a plurality of user behavior data are formed into a fraudulent label deviation vector, so that the vector expression capacity of the fraudulent label deviation vector is improved, and the accuracy score of the follow-up fraudulent label deviation predicted value is improved.
In an alternative embodiment, the kth fraud knowledge description unit in the kth fraud knowledge description unit is used for carrying out kth fraud vector description on the loading data of the kth fraud knowledge description unit in the step B based on the kth fraud knowledge description units in the K fraud knowledge description units, so as to obtain the kth fraud knowledge vector of each user behavior data, and the following steps can be executed on each user behavior data (taking the user behavior data a in the target financial service user E as an example for illustration) through the kth fraud knowledge description unit.
In step B1, other user behavior data than the user behavior data in the user behavior directed graph data, still taking the target financial service user E as an example, are obtained, and the other user behavior data are other user behavior data B than the user behavior data a and other user behavior data C.
In step B2, a first vector mapping is performed on the kth-1 fraudulent knowledge vector of the user behavior data and the kth-1 fraudulent knowledge vector of each other user behavior data to obtain a kth directed relation vector of the user behavior data corresponding to each other user behavior data.
Extracting a kth-1 fraudulent airspace vector of the user behavior data from a kth-1 fraudulent knowledge vector of the user behavior data, and extracting a kth-1 fraudulent airspace vector of each other user behavior data from a kth-1 fraudulent knowledge vector of each other user behavior data; extracting a kth-1 fraudulent time domain vector of the user behavior data from the kth-1 fraudulent knowledge vector of the user behavior data, and extracting a kth-1 fraudulent time domain vector of each other user behavior data from the kth-1 fraudulent knowledge vector of each other user behavior data; extracting a kth-1 directed path relation of the user behavior data from a kth-1 fraud knowledge vector of the user behavior data; the following steps are performed for each other user behavior data (hereinafter, user behavior data B is taken as an example): extracting the kth-1 directed path relation of the user behavior data aiming at other user behavior data from the kth-1 directed path relation of the user behavior data; acquiring a first vector distance between a kth-1 fraudulent airspace vector of user behavior data and a kth-1 fraudulent airspace vector of other user behavior data; and performing first vector fusion on the square of the first vector distance, the k-1 fraud time domain vector of the user behavior data, the k-1 fraud time domain vector of other user behavior data and the k-1 directed path relation of the user behavior data aiming at the other user behavior data to obtain a k directed relation vector of the user behavior data corresponding to the other user behavior data.
The vector distance between any two user behavior data and the behavior flow direction relation of any two user behavior data are combined into the directed relation vector, so that the directed relation vector can learn the global information of the user behavior directed graph data, and the characteristic learning performance of the fraudulent analysis neural network can be improved.
In an alternative embodiment, assuming K is 3, still taking user behavior data a and other user behavior data B as an example, the 2 nd fraudulent airspace vector of user behavior data a is extracted from the 2 nd vector of user behavior data a, the 2 nd fraudulent airspace vector of user behavior data B is extracted from the 2 nd vector of user behavior data B, the 2 nd fraudulent time domain vector of user behavior data is extracted from the 2 nd vector of user behavior data a, and the 2 nd fraudulent time domain vector of user behavior data B is extracted from the 2 nd vector of user behavior data B. The kth-1 directional path relationship is an initial directional path relationship, that is, the directional path relationship is not changed due to vector iteration, the 2 nd directional path relationship of the user behavior data a (the initial directional path relationship of the user behavior data a) is extracted from the 2 nd vector of the user behavior data a, and the 2 nd directional path relationship of the user behavior data (the initial directional path relationship of the user behavior data B) is extracted from the 2 nd vector of the user behavior data B.
In step B3, a second vector mapping is performed on the kth-1 fraudulent knowledge vector of the user behavior data and the kth directed relation vector of the user behavior data corresponding to each other user behavior data, so as to obtain the kth fraudulent knowledge vector of the user behavior data.
Fusing the kth directed relation vector of the user behavior data corresponding to a plurality of other user behavior data to obtain the kth directed relation vector of the user behavior data; performing second vector fusion on the kth-1 fraudulent time domain vector of the user behavior data and the kth directed relation vector of the user behavior data to obtain the kth fraudulent time domain vector of the user behavior data; acquiring a first vector distance between a kth-1 fraudulent airspace vector of user behavior data and a kth-1 fraudulent airspace vector of each other user behavior data; vector mapping is carried out on the kth directed relation vector of the user behavior data corresponding to each other user behavior data, and behavior influence coefficients of each other user behavior data are obtained; according to the behavior influence coefficient of each other user behavior data, performing weight fusion calculation on the first vector distances of the plurality of other user behavior data to obtain fusion calculation data of the corresponding user behavior data; fusing the fused calculation data of the user behavior data with the k-1 fraudulent airspace vector of the user behavior data to obtain the k fraudulent airspace vector of the user behavior data; taking the initial directed path relation of the user behavior data as the kth directed path relation of the user behavior data; and forming a kth fraud knowledge vector of the user behavior data by the kth directed path relation of the user behavior data, the kth fraud time domain vector of the user behavior data and the kth fraud space domain vector of the user behavior data.
By combining the vector distance between any two user behavior data and the behavior flow direction relation of any two user behavior data into the kth fraud knowledge vector, the kth fraud knowledge vector can learn global information of the user behavior directed graph data, and the characteristic learning performance of the fraud behavior analysis neural network can be improved.
In an alternative embodiment, a first vector distance between a kth-1 fraudulent airspace vector of user behavior data A and a kth-1 fraudulent airspace vector of other user behavior data (other user behavior data B and other user behavior data C) is obtained; taking the kth directional relation vector of the user behavior data A corresponding to each other user behavior data (other user behavior data B and other user behavior data C) as a weight, and carrying out weight fusion calculation on first vector distances of a plurality of other user behavior data (other user behavior data B and other user behavior data C) to obtain fusion calculation data corresponding to the user behavior data A; and fusing the fused calculation data of the user behavior data A with the k-1 fraudulent airspace vector of the user behavior data A to obtain the k fraudulent airspace vector of the user behavior data A.
In an alternative embodiment, the initial directed path relation of the user behavior data a is taken as the kth directed path relation of the user behavior data a; and forming a kth fraud knowledge vector of the user behavior data by using the kth directed path relation aij of the user behavior data A corresponding to each other user behavior data, the kth fraud time domain vector of the user behavior data A and the kth fraud space vector of the user behavior data A.
In an alternative embodiment, in step C, the kth fraud knowledge vector of each user behavior data is extracted by the kth+1 fraud knowledge description unit to obtain the kth+1 fraud time domain vector of each user behavior data, which may specifically be: extracting a kth fraud airspace vector of the user behavior data, a kth fraud time domain vector of the user behavior data and a kth directed path relation of the user behavior data from kth fraud knowledge vectors of the user behavior data; the following steps are performed for each user behavior data: acquiring other user behavior data except the user behavior data in the user behavior directed graph data, and executing the following steps aiming at each other user behavior data: extracting a kth directed path relation of the user behavior data aiming at other user behavior data from a kth directed path relation of the user behavior data, and acquiring a second vector distance between a kth fraudulent airspace vector of the user behavior data and a kth fraudulent airspace vector of other user behavior data; performing first vector fusion on the square of the second vector distance, a kth fraud time domain vector of the user behavior data, a kth fraud time domain vector of other user behavior data and a kth directed path relation of the user behavior data aiming at other user behavior data to obtain a kth+1 directed relation vector of the user behavior data corresponding to other user behavior data; fusing the k+1th directional relation vector of the user behavior data corresponding to a plurality of other user behavior data to obtain the k+1th directional relation vector of the user behavior data; and carrying out second vector fusion on the kth fraud time domain vector of the user behavior data and the kth+1 directional relation vector of the user behavior data to obtain the kth+1 fraud time domain vector of the user behavior data.
In an alternative embodiment, the kth fraudulent spatial vector of the user behavior data and the kth directional path relation of the user behavior data are extracted from kth fraudulent knowledge vectors of the user behavior data, specifically, assuming that K has a value of 3, taking the user behavior data a, the user behavior data B and the user behavior data C as an example, the following steps are still performed, the 2 nd fraudulent spatial vector of the user behavior data is extracted from the 2 nd vector of the user behavior data a, the 2 nd fraudulent spatial vector of the user behavior data B is extracted from the 2 nd vector of the user behavior data B, the 2 nd fraudulent spatial vector of the user behavior data C is extracted from the 2 nd vector of the user behavior data C, the 2 nd fraudulent temporal vector of the user behavior data is extracted from the 2 nd vector of the user behavior data B, and the 2 nd fraudulent spatial vector of the user behavior data C is extracted from the 2 nd vector of the user behavior data C. The kth directional path relationship is an initial directional path relationship, that is, the directional path relationship is not changed due to vector iteration, the 2 nd directional path relationship of the user behavior data (the initial directional path relationship of the user behavior data a) is extracted from the 2 nd vector of the user behavior data a, the 2 nd directional path relationship of the user behavior data (the initial directional path relationship of the user behavior data B) is extracted from the 2 nd vector of the user behavior data B, and the 2 nd directional path relationship of the user behavior data (the initial directional path relationship of the user behavior data C) is extracted from the 2 nd vector of the user behavior data C.
In an alternative embodiment, before the fraud tag deviation value estimation is performed on the user behavior directed graph data of the target financial service user based on the fraud analysis neural network, the steps S105 to S109 may be further performed, so as to obtain the fraud tag deviation value of the target financial service user.
In step S105, template user behavior directed graph data is acquired, and feature derivation is performed on the template user behavior directed graph data, so as to obtain a plurality of template derived behavior directed graph data.
In step S106, a fraud tag deviation label value of each template-derived behavior directed graph data is acquired.
In an alternative embodiment, the acquiring the fraud tag deviation label value of each template derived behavior directed graph data in step S106 may specifically be: the following steps are performed for each template-derived behavioral directed graph data: performing a first fraud tag value estimation strategy on the template-derived behavior directed graph data to obtain a first fraud tag value of the template-derived behavior directed graph data; performing a second fraud tag value estimation strategy on the template-derived behavior directed graph data to obtain a second fraud tag value of the template-derived behavior directed graph data; and acquiring a second fraud tag value of the template user behavior directed graph data and a first loss value of a first fraud tag value of the template user behavior directed graph data as fraud tag deviation labeling values of the template derived behavior directed graph data.
In step S107, the template-derived behavior directed graph data is forward-propagated in the initial fraud analysis neural network, and fraud tag deviation prediction values of the template-derived behavior directed graph data are obtained.
In an alternative embodiment, the fraud vector description is performed on the user behavior directed graph data through an initial fraud analysis neural network to obtain a fraud tag deviation vector of the target financial service user; and performing fraud tag deviation value estimation on the fraud tag deviation vector through the initial fraud analysis neural network to obtain a fraud tag deviation value of the target financial service user. Specific implementation of the initial fraud analysis neural network may be found in the foregoing description.
In step S108, the global training cost value of the corresponding fraud analysis neural network is determined according to the fraud label deviation labeling value of each template-derived behaviour directed graph data and the fraud label deviation prediction value of each template-derived behaviour directed graph data.
In an alternative embodiment, in step S108, the global training cost value of the corresponding fraud analysis neural network is determined according to the fraud label deviation labeling value of each template-derived behavior directed graph data and the fraud label deviation prediction value of each template-derived behavior directed graph data, which may specifically be: the following steps are performed for each template-derived behavioral directed graph data: determining a first root mean square loss value of the template-derived directed graph data according to the fraud tag deviation labeling value of the template-derived directed graph data and the fraud tag deviation predicted value of the template-derived directed graph data; acquiring other template-derived behavior directed graph data except for the template-derived behavior directed graph data of the template user behavior directed graph data; the following steps are performed for each other template-derived behavioral directed graph data: determining a second loss value between the fraud tag deviation labeling value of the template-derived behavior directed graph data and the fraud tag deviation labeling value of the other template-derived behavior directed graph data, and determining a third loss value between the fraud tag deviation prediction value of the template-derived behavior directed graph data and the fraud tag deviation prediction value of the other template-derived behavior directed graph data; performing root mean square calculation on the second loss value and the third loss value to obtain a second root mean square loss value of the template-derived behavior directed graph data corresponding to other template-derived behavior directed graph data; fusing second root mean square loss values of the template derived behavior directed graph data corresponding to a plurality of other template derived behavior directed graph data to obtain third root mean square loss values of the template derived behavior directed graph data; and carrying out third vector fusion on the first root mean square loss value of the plurality of template derived behavior directed graph data and the third root mean square loss value of the plurality of template user behavior directed graph data to obtain the global training cost value of the corresponding fraud analysis neural network.
In step S109, the global training cost value is back-propagated in the fraud analysis neural network, so as to obtain the network weight update information of the fraud analysis neural network when the global training cost value converges, and the network weight information of the fraud analysis neural network is updated according to the network weight update information.
In one possible embodiment, a digital financial big data system, which may be a server, is provided that includes a processor, a memory, an Input/Output interface (I/O) and a communication interface. The processor, the memory and the input/output interface are connected through a system bus, and the communication interface is connected to the system bus through the input/output interface. Wherein the processor of the digital financial big data system is configured to provide computing and control capabilities. The memory of the digital financial big data system comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the digital financial big data system is used for storing the data related to the method. The model loading data/output interface of the digital financial big data system is used for exchanging information between the processor and the external equipment. The communication interface of the digital financial big data system is used for communicating with an external terminal through network connection. The computer program, when executed by a processor, implements an artificial intelligence based fraud analysis method.
In some design considerations, a digital financial big data system is provided, which may be a terminal. The digital financial big data system comprises a processor, a memory, an input/output interface, a communication interface, a display unit and an input device. The processor, the memory and the input/output interface are connected through a system bus, and the communication interface, the display unit and the input device are connected to the system bus through the input/output interface. Wherein the processor of the digital financial big data system is configured to provide computing and control capabilities. The memory of the digital financial big data system comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The model loading data/output interface of the digital financial big data system is used for exchanging information between the processor and the external equipment. The communication interface of the digital financial big data system is used for carrying out wired or wireless communication with an external terminal, and the wireless mode can be realized through WIFI, a mobile cellular network, NFC (near field communication) or other technologies. The computer program, when executed by a processor, implements an artificial intelligence based fraud analysis method. The display unit of the digital financial big data system is used for forming a visual picture.
In some design considerations, a digital financial big data system is provided, comprising a memory and a processor, the memory storing a computer program, the processor implementing the steps of the method embodiments described above when executing the computer program.
In some design considerations, a computer readable storage medium is provided, on which a computer program is stored, which, when executed by a processor, implements the steps of the method embodiments described above.
In some design considerations, a computer program product is provided, comprising a computer program which, when executed by a processor, implements the steps of the method embodiments described above.
The foregoing examples illustrate only a few embodiments of the application and are described in detail herein without thereby limiting the scope of the application. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the application, which are all within the scope of the application. Accordingly, the scope of the application should be assessed as that of the appended claims.

Claims (3)

1. A method for analysis of fraud based on artificial intelligence, the method comprising:
Acquiring user behavior directed graph data of a target financial service user;
Based on the fraud analysis neural network, fraud label deviation value estimation is carried out on the user behavior directed graph data of the target financial service user, so as to obtain fraud label deviation values of the target financial service user; the fraud analysis neural network is generated by updating network weight parameters by combining fraud tag deviation values of template user behavior directed graph data, wherein the fraud tag deviation values of the template user behavior directed graph data are used for representing fraud tag loss values obtained when fraud tag values of the template user behavior directed graph data are calculated according to two fraud tag value estimation strategies respectively, the two fraud tag value estimation strategies comprise a first fraud tag value estimation strategy and a second fraud tag value estimation strategy, the accuracy score of the first fraud tag value estimation strategy is smaller than the accuracy score of the second fraud tag value estimation strategy, and the estimated performance value of the first fraud tag value estimation strategy is larger than the estimated performance value of the second fraud tag value estimation strategy;
Performing the first fraud tag value estimation strategy on the user behavior directed graph data of the target financial service user to obtain a first fraud tag value of the target financial service user;
performing bias value optimization on a first bias value of the target financial service user according to the bias value of the bias label of the target financial service user to obtain a second bias value of the target financial service user;
The fraud analysis neural network based on fraud label bias value estimation is performed on the user behavior directed graph data of the target financial service user, and the fraud label bias value of the target financial service user is obtained, including:
performing fraud vector description on the user behavior directed graph data based on the fraud analysis neural network to obtain fraud label deviation vectors of the target financial service users;
Performing fraud tag deviation value estimation on the fraud tag deviation vector based on the fraud analysis neural network to obtain a fraud tag deviation value of the target financial service user;
The fraud analysis neural network comprises K fraud knowledge description units which are connected in sequence, the fraud vector description is carried out on the user behavior directed graph data based on the fraud analysis neural network, and a fraud label deviation vector of the target financial service user is obtained, and the fraud knowledge description unit comprises:
Performing basic fraud knowledge vector description on each user behavior data in the user behavior directed graph data to obtain basic fraud knowledge vectors of each user behavior data;
responding K is 1-K-2, carrying out kth fraud vector description on the loading data of kth fraud knowledge description units based on kth fraud knowledge description units in K fraud knowledge description units which are connected in sequence, obtaining kth fraud knowledge vectors of the user behavior data, and loading the kth fraud knowledge vectors to the kth+1 fraud knowledge description units to continue the kth+1 fraud vector description;
Responding K to K-1, carrying out fraud time domain vector extraction on the kth fraud knowledge vector of each user behavior data based on the kth+1 fraud knowledge description unit to obtain the kth+1 fraud time domain vector of each user behavior data, carrying out fraud space vector extraction on the kth fraud knowledge vector of each user behavior data based on the kth+1 fraud knowledge description unit to obtain the kth+1 fraud space vector of each user behavior data, and forming the kth+1 fraud time domain vector and the kth+1 fraud space vector of each user behavior data into the fraud tag deviation vector;
Wherein K is more than or equal to 2 and is a positive integer which is gradually increased by 1, and K is more than or equal to 1 and is less than or equal to K-1; when K is 1, the loading data of the kth fraud knowledge description unit is a basic fraud knowledge vector of the behavior data of each user, and when K is 2-K-1, the loading data of the kth fraud knowledge description unit is a kth-1 fraud knowledge vector of the behavior data of each user output by the kth-1 fraud knowledge description unit;
the step of carrying out basic fraud knowledge vector description on each user behavior data in the user behavior directed graph data to obtain basic fraud knowledge vectors of each user behavior data comprises the following steps:
Acquiring basic fraud time domain vectors of all user behavior data in the user behavior directed graph data, and acquiring basic fraud airspace vectors of all user behavior data in the user behavior directed graph data; the basic fraud time domain vector is used for reflecting a time sequence vector of the user behavior data, and the basic fraud airspace vector is used for reflecting a space sequence vector of the user behavior data;
the following steps are executed for each piece of user behavior data in the user behavior directed graph data:
Acquiring at least one other user behavior data except the user behavior data in the user behavior directed graph data, and acquiring an initial directed path relation between the user behavior data and each other user behavior data, wherein the initial directed path relation is used for reflecting the behavior flow direction relation between the user behavior data and the other user behavior data;
Forming basic fraud knowledge vectors of the user behavior data by using basic fraud time domain vectors of the user behavior data, basic fraud airspace vectors of the user behavior data and initial directed path relations of the user behavior data;
The kth fraud knowledge description unit based on the K fraud knowledge description units connected in turn carries out kth fraud vector description on the loading data of the kth fraud knowledge description unit to obtain kth fraud knowledge vectors of the user behavior data, and the kth fraud knowledge vector description method comprises the following steps:
performing the following steps for each of the user behavior data based on the kth fraud knowledge description unit: acquiring other user behavior data except the user behavior data in the user behavior directed graph data;
performing a first vector mapping on a kth-1 fraudulent knowledge vector of the user behavior data and a kth-1 fraudulent knowledge vector of each other user behavior data to obtain a kth directed relation vector of each other user behavior data corresponding to the user behavior data;
performing a second vector mapping on a kth-1 fraudulent knowledge vector of the user behavior data and a kth directed relation vector of the user behavior data corresponding to each of the other user behavior data to obtain a kth fraudulent knowledge vector of the user behavior data;
the k+1-th fraud knowledge description unit performs fraud time domain vector extraction on the k-th fraud knowledge vector of each user behavior data to obtain a k+1-th fraud time domain vector of each user behavior data, including:
Extracting a kth fraud airspace vector of the user behavior data, a kth fraud time domain vector of the user behavior data and a kth directed path relation of the user behavior data from kth fraud knowledge vectors of the user behavior data;
For each piece of user behavior data, acquiring other pieces of user behavior data except the user behavior data in the user behavior directed graph data, and executing the following steps for each piece of other pieces of user behavior data:
Extracting a kth directed path relation of the user behavior data aiming at the other user behavior data from the kth directed path relation of the user behavior data, and acquiring a second vector distance between a kth fraudulent airspace vector of the user behavior data and a kth fraudulent airspace vector of the other user behavior data;
Performing a first vector fusion on the square of the second vector distance, a kth fraud time domain vector of the user behavior data, a kth fraud time domain vector of the other user behavior data, and a kth directed path relation of the user behavior data with respect to the other user behavior data to obtain a kth+1 directed relation vector of the user behavior data corresponding to the other user behavior data;
Fusing the k+1th directional relation vector of the user behavior data corresponding to a plurality of other user behavior data to obtain the k+1th directional relation vector of the user behavior data;
performing second vector fusion on the kth fraud time domain vector of the user behavior data and the kth+1 directional relation vector of the user behavior data to obtain the kth+1 fraud time domain vector of the user behavior data;
The performing a first vector mapping on the kth-1 fraudulent knowledge vector of the user behavior data and the kth-1 fraudulent knowledge vector of each other user behavior data to obtain a kth directed relationship vector of the user behavior data corresponding to each other user behavior data, including:
Extracting a kth-1 fraudulent airspace vector of the user behavior data, a kth-1 fraudulent time domain vector of the user behavior data, and a kth-1 directed path relationship of the user behavior data from a kth-1 fraudulent knowledge vector of the user behavior data;
Extracting a kth-1 fraudulent spatial vector of each of the other user behavior data and a kth-1 fraudulent time domain vector of each of the other user behavior data from a kth-1 fraudulent knowledge vector of each of the other user behavior data;
the following steps are performed for each of the other user behavior data:
extracting a kth-1 directed path relation of the user behavior data for the other user behavior data from the kth-1 directed path relation of the user behavior data;
acquiring a first vector distance between a kth-1 fraudulent airspace vector of the user behavior data and a kth-1 fraudulent airspace vector of the other user behavior data;
Performing a first vector fusion on the square of the first vector distance, the kth-1 fraudulent time domain vector of the user behavior data, the kth-1 fraudulent time domain vector of the other user behavior data, and the kth-1 directed path relation of the user behavior data to the other user behavior data to obtain a kth directed relation vector of the user behavior data corresponding to the other user behavior data;
the k-1 th fraudulent knowledge vector of the user behavior data and the k directed relation vector of the user behavior data corresponding to each other user behavior data are mapped by a second vector to obtain a k fraudulent knowledge vector of the user behavior data, and the method comprises the following steps:
Fusing the kth directed relation vector of the user behavior data corresponding to a plurality of other user behavior data to obtain the kth directed relation vector of the user behavior data;
performing second vector fusion on the kth-1 fraudulent time domain vector of the user behavior data and the kth directed relation vector of the user behavior data to obtain the kth fraudulent time domain vector of the user behavior data;
Acquiring a first vector distance between a kth-1 fraudulent airspace vector of the user behavior data and a kth-1 fraudulent airspace vector of each other user behavior data;
Vector mapping is carried out on the kth directed relation vector of the user behavior data corresponding to each other user behavior data, and behavior influence coefficients of each other user behavior data are obtained;
According to the behavior influence coefficients of the other user behavior data, performing weight fusion calculation on the first vector distances of the plurality of other user behavior data to obtain fusion calculation data corresponding to the user behavior data;
Fusing the fused calculation data of the user behavior data with the k-1 fraudulent airspace vector of the user behavior data to obtain the k fraudulent airspace vector of the user behavior data;
And taking the initial directed path relation of the user behavior data as a kth directed path relation of the user behavior data, and forming a kth fraud knowledge vector of the user behavior data by the kth directed path relation of the user behavior data, a kth fraud time domain vector of the user behavior data and a kth fraud space vector of the user behavior data.
2. The artificial intelligence based fraud analysis method of claim 1, wherein prior to fraud tag bias value estimation on the targeted financial service user's user behavior directed graph data based on fraud analysis neural network, obtaining the targeted financial service user's fraud tag bias value, the method further comprises:
Acquiring template user behavior directed graph data, and performing feature derivation on the template user behavior directed graph data to acquire a plurality of template derived behavior directed graph data;
acquiring fraud tag deviation labeling values of the template derived behavior directed graph data;
forward transmitting each template-derived behavior directed graph data in an initial fraud analysis neural network to obtain fraud label deviation prediction values of each template-derived behavior directed graph data;
Determining global training cost values according to the fraud tag deviation labeling values of the template-derived behavior directed graph data and the fraud tag deviation predicting values of the template-derived behavior directed graph data;
Performing back propagation processing on the global training cost value in the initial fraud analysis neural network to obtain network weight updating information of the initial fraud analysis neural network when the global training cost value converges, and updating the network weight information of the initial fraud analysis neural network according to the network weight updating information;
the obtaining the fraud tag deviation labeling value of each template derived behavior directed graph data comprises the following steps:
the following steps are executed for each template derived behavior directed graph data:
Performing a first fraud tag value estimation strategy on the template-derived behavior directed graph data to obtain a first fraud tag value of the template-derived behavior directed graph data; performing a second fraud tag value estimation strategy on the template-derived behavior directed graph data to obtain a second fraud tag value of the template-derived behavior directed graph data;
Acquiring a first loss value between a second fraud tag value of the template-derived behavior directed graph data and a first fraud tag value of the template-derived behavior directed graph data as a fraud tag deviation labeling value of the template-derived behavior directed graph data;
the determining the global training cost value according to the fraud tag deviation labeling value of each template derived behavior directed graph data and the fraud tag deviation predicting value of each template derived behavior directed graph data comprises the following steps:
the following steps are executed for each template derived behavior directed graph data:
Determining a first root mean square loss value of the template-derived behavior directed graph data according to the fraud tag deviation labeling value of the template-derived behavior directed graph data and the fraud tag deviation predicting value of the template-derived behavior directed graph data;
acquiring other template-derived behavior directed graph data except for the template-derived behavior directed graph data of the template user behavior directed graph data;
The following steps are performed for each of the other template-derived behavioral directed graph data: determining a second loss value between the fraud tag deviation labeling value of the template-derived directed graph data and the fraud tag deviation labeling value of the other template-derived directed graph data, and determining a third loss value between the fraud tag deviation prediction value of the template-derived directed graph data and the fraud tag deviation prediction value of the other template-derived directed graph data;
performing root mean square calculation on the second loss value and the third loss value to obtain a second root mean square loss value of the other template-derived behavior directed graph data corresponding to the template-derived behavior directed graph data;
Fusing the second root mean square loss values of the template-derived behavior directed graph data corresponding to a plurality of other template-derived behavior directed graph data to obtain a third root mean square loss value of the template-derived behavior directed graph data;
and carrying out third vector fusion on the first root mean square loss values of the plurality of template-derived behavior directed graph data and the third root mean square loss values of the plurality of template-derived behavior directed graph data to obtain global training cost values corresponding to the fraud analysis neural network.
3. A digital financial big data system, characterized in that it comprises a processor and a memory for storing a computer program capable of running on the processor, said processor being adapted to execute the artificial intelligence based fraud analysis method according to claim 1 or 2 when running said computer program.
CN202311141405.2A 2023-09-06 2023-09-06 Fraud analysis method based on artificial intelligence and digital financial big data system Active CN117575596B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311141405.2A CN117575596B (en) 2023-09-06 2023-09-06 Fraud analysis method based on artificial intelligence and digital financial big data system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311141405.2A CN117575596B (en) 2023-09-06 2023-09-06 Fraud analysis method based on artificial intelligence and digital financial big data system

Publications (2)

Publication Number Publication Date
CN117575596A CN117575596A (en) 2024-02-20
CN117575596B true CN117575596B (en) 2024-09-06

Family

ID=89888697

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311141405.2A Active CN117575596B (en) 2023-09-06 2023-09-06 Fraud analysis method based on artificial intelligence and digital financial big data system

Country Status (1)

Country Link
CN (1) CN117575596B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118469298B (en) * 2024-07-09 2024-09-10 成都冰鉴信息科技有限公司 Business risk prediction method and system based on big data analysis

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109064318A (en) * 2018-08-24 2018-12-21 苏宁消费金融有限公司 A kind of internet financial risks monitoring system of knowledge based map
CN109816397A (en) * 2018-12-03 2019-05-28 北京奇艺世纪科技有限公司 A kind of fraud method of discrimination, device and storage medium

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190279218A1 (en) * 2014-08-08 2019-09-12 Brighterion, Inc. Behavior tracking smart agents for artificial intelligence fraud protection and management
CN109871445A (en) * 2019-01-23 2019-06-11 平安科技(深圳)有限公司 Fraudulent user identification method, device, computer equipment and storage medium
US11593811B2 (en) * 2019-02-05 2023-02-28 International Business Machines Corporation Fraud detection based on community change analysis using a machine learning model
US20200252802A1 (en) * 2019-02-06 2020-08-06 Pccw Vuclip (Singapore) Pte. Ltd. Apparatus and method for fraud detection
US20210374756A1 (en) * 2020-05-29 2021-12-02 Mastercard International Incorporated Methods and systems for generating rules for unseen fraud and credit risks using artificial intelligence
CN112463923B (en) * 2020-11-25 2023-04-28 平安科技(深圳)有限公司 User fraud detection method, device, equipment and storage medium
CN112200644B (en) * 2020-12-09 2021-05-14 北京顺达同行科技有限公司 Method and device for identifying fraudulent user, computer equipment and storage medium
CN114298417A (en) * 2021-12-29 2022-04-08 中国银联股份有限公司 Anti-fraud risk assessment method, anti-fraud risk training method, anti-fraud risk assessment device, anti-fraud risk training device and readable storage medium
CN116433345B (en) * 2023-05-05 2024-05-24 意数信息技术(上海)有限公司 AI-based fraudulent activity analysis method and digital financial product service system
CN116611916A (en) * 2023-06-25 2023-08-18 云南却蓉科技有限责任公司 Digital finance anti-fraud processing method and system based on AI model identification
CN116542673B (en) * 2023-07-05 2023-09-08 成都乐超人科技有限公司 Fraud identification method and system applied to machine learning

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109064318A (en) * 2018-08-24 2018-12-21 苏宁消费金融有限公司 A kind of internet financial risks monitoring system of knowledge based map
CN109816397A (en) * 2018-12-03 2019-05-28 北京奇艺世纪科技有限公司 A kind of fraud method of discrimination, device and storage medium

Also Published As

Publication number Publication date
CN117575596A (en) 2024-02-20

Similar Documents

Publication Publication Date Title
AU2020202542B2 (en) Transforming attributes for training automated modeling systems
US20200287926A1 (en) Graph structure model training and junk account identification
CN106548210B (en) Credit user classification method and device based on machine learning model training
JP7612727B2 (en) Control method and processor programmed with instructions - Patents.com
CN112487278A (en) Training method of recommendation model, and method and device for predicting selection probability
CN113487327A (en) Transaction parameter setting method and device based on clustering algorithm
CN112288572B (en) Service data processing method and computer equipment
Chen et al. Generative inverse deep reinforcement learning for online recommendation
JP6782680B2 (en) Systems and methods for instructional analysis
CN113283671B (en) Method and device for predicting replenishment quantity, computer equipment and storage medium
CN117575596B (en) Fraud analysis method based on artificial intelligence and digital financial big data system
Luna et al. Adaptive fuzzy system to forecast financial time series volatility
CN111738441A (en) Prediction model training method and device considering prediction precision and privacy protection
CN109754104B (en) Method, system, equipment and medium for optimizing enterprise supply chain by applying artificial intelligence
KR20240083359A (en) Method, Apparatus and System for Valuation Based on Inventory
CN111510473B (en) Access request processing method and device, electronic equipment and computer readable medium
CN116433345B (en) AI-based fraudulent activity analysis method and digital financial product service system
US20230342626A1 (en) Model processing method and related apparatus
CN117830012A (en) Method, device, equipment and storage medium for determining community business risk
US20230351491A1 (en) Accelerated model training for real-time prediction of future events
CN115409635A (en) Information prediction method, device, equipment and medium
CN115239068A (en) Target task decision method and device, electronic equipment and storage medium
CN114978765A (en) Big data processing method serving information attack defense and AI attack defense system
CN116542728A (en) Service processing method, device, program product, computer equipment and medium
US20230351169A1 (en) Real-time prediction of future events using integrated input relevancy

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20240407

Address after: No. 59 Gongye South Road, Lixia District, Jinan City, Shandong Province, 250101

Applicant after: Li Jianjun

Country or region after: China

Address before: 277727 Wanding Technology, E-Huang Road Intelligent Manufacturing Industrial Park, High tech Zone, Lanshan District, Linyi City, Shandong Province

Applicant before: Linyi Wanding Network Technology Co.,Ltd.

Country or region before: China

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20240808

Address after: Room 2001-2, Building 1, Hengyuan International Wealth Center, No. 1515 Tonghui North Road, Ningwei Street, Xiaoshan District, Hangzhou City, Zhejiang Province 310000 (self declared)

Applicant after: Xiongju Digital Technology (Zhejiang) Co.,Ltd.

Country or region after: China

Address before: No. 59 Gongye South Road, Lixia District, Jinan City, Shandong Province, 250101

Applicant before: Li Jianjun

Country or region before: China

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant