Disclosure of Invention
In order to at least overcome the above-mentioned shortcomings in the prior art, an object of an embodiment of the present application is to provide an artificial intelligence-based fraud analysis method and a digital financial big data system.
In a first aspect, an embodiment of the present application provides an artificial intelligence based fraud analysis method applied to a digital financial big data system, the method including:
Acquiring user behavior directed graph data of a target financial service user;
Based on the fraud analysis neural network, fraud label deviation value estimation is carried out on the user behavior directed graph data of the target financial service user, so as to obtain fraud label deviation values of the target financial service user; the fraud analysis neural network is generated by updating network weight parameters by combining fraud tag deviation values of template user behavior directed graph data, wherein the fraud tag deviation values of the template user behavior directed graph data are used for representing fraud tag loss values obtained when fraud tag values of the template user behavior directed graph data are calculated according to two fraud tag value estimation strategies respectively, the two fraud tag value estimation strategies comprise a first fraud tag value estimation strategy and a second fraud tag value estimation strategy, the accuracy score of the first fraud tag value estimation strategy is smaller than the accuracy score of the second fraud tag value estimation strategy, and the estimated performance value of the first fraud tag value estimation strategy is larger than the estimated performance value of the second fraud tag value estimation strategy;
Performing the first fraud tag value estimation strategy on the user behavior directed graph data of the target financial service user to obtain a first fraud tag value of the target financial service user;
and optimizing the deviation value of the first fraud tag value of the target financial service user according to the fraud tag deviation value of the target financial service user to obtain a second fraud tag value of the target financial service user.
In a possible implementation manner of the first aspect, the fraud tag bias value estimating, by the fraud analysis neural network, the user behavior directed graph data of the target financial service user, to obtain a fraud tag bias value of the target financial service user includes:
performing fraud vector description on the user behavior directed graph data based on the fraud analysis neural network to obtain fraud label deviation vectors of the target financial service users;
And estimating the fraud tag deviation value of the fraud tag deviation vector based on the fraud analysis neural network to obtain the fraud tag deviation value of the target financial service user.
In a possible implementation manner of the first aspect, the fraud analysis neural network includes K fraud knowledge description units connected in sequence, and the fraud vector description is performed on the user behavior directed graph data based on the fraud analysis neural network to obtain a fraud tag deviation vector of the target financial service user, including:
Performing basic fraud knowledge vector description on each user behavior data in the user behavior directed graph data to obtain basic fraud knowledge vectors of each user behavior data;
responding K is 1-K-2, carrying out kth fraud vector description on the loading data of kth fraud knowledge description units based on kth fraud knowledge description units in K fraud knowledge description units which are connected in sequence, obtaining kth fraud knowledge vectors of the user behavior data, and loading the kth fraud knowledge vectors to the kth+1 fraud knowledge description units to continue the kth+1 fraud vector description;
Responding K to K-1, carrying out fraud time domain vector extraction on the kth fraud knowledge vector of each user behavior data based on the kth+1 fraud knowledge description unit to obtain the kth+1 fraud time domain vector of each user behavior data, carrying out fraud space vector extraction on the kth fraud knowledge vector of each user behavior data based on the kth+1 fraud knowledge description unit to obtain the kth+1 fraud space vector of each user behavior data, and forming the kth+1 fraud time domain vector and the kth+1 fraud space vector of each user behavior data into the fraud tag deviation vector;
Wherein K is more than or equal to 2 and is a positive integer which is gradually increased by 1, and K is more than or equal to 1 and is less than or equal to K-1; and when K is 1, the loading data of the kth fraud knowledge description unit is a basic fraud knowledge vector of the behavior data of each user, and when K is 2-K-1, the loading data of the kth fraud knowledge description unit is a kth-1 fraud knowledge vector of the behavior data of each user output by the kth-1 fraud knowledge description unit.
In a possible implementation manner of the first aspect, the performing a basic fraud knowledge vector description on each user behavior data in the user behavior directed graph data to obtain a basic fraud knowledge vector of each user behavior data includes:
Acquiring basic fraud time domain vectors of all user behavior data in the user behavior directed graph data, and acquiring basic fraud airspace vectors of all user behavior data in the user behavior directed graph data; the basic fraud time domain vector is used for reflecting a time sequence vector of the user behavior data, and the basic fraud airspace vector is used for reflecting a space sequence vector of the user behavior data;
the following steps are executed for each piece of user behavior data in the user behavior directed graph data:
Acquiring at least one other user behavior data except the user behavior data in the user behavior directed graph data, and acquiring an initial directed path relation between the user behavior data and each other user behavior data, wherein the initial directed path relation is used for reflecting the behavior flow direction relation between the user behavior data and the other user behavior data;
And forming basic fraud knowledge vectors of the user behavior data by the basic fraud time domain vectors of the user behavior data, the basic fraud airspace vectors of the user behavior data and the initial directed path relation of the user behavior data.
In a possible implementation manner of the first aspect, the K-th fraud knowledge description unit according to the K-th fraud knowledge description units connected in sequence performs a K-th fraud vector description on the loading data of the K-th fraud knowledge description unit to obtain a K-th fraud knowledge vector of each user behavior data, including:
performing the following steps for each of the user behavior data based on the kth fraud knowledge description unit: acquiring other user behavior data except the user behavior data in the user behavior directed graph data;
performing a first vector mapping on a kth-1 fraudulent knowledge vector of the user behavior data and a kth-1 fraudulent knowledge vector of each other user behavior data to obtain a kth directed relation vector of each other user behavior data corresponding to the user behavior data;
and performing second vector mapping on the kth-1 fraudulent knowledge vector of the user behavior data and the kth directed relation vector of the user behavior data corresponding to each other user behavior data to obtain the kth fraudulent knowledge vector of the user behavior data.
In a possible implementation manner of the first aspect, the performing a first vector mapping on the kth-1 fraudulent knowledge vector of the user behavior data and the kth-1 fraudulent knowledge vector of each of the other user behavior data to obtain a kth directional relation vector of the user behavior data corresponding to each of the other user behavior data includes:
Extracting a kth-1 fraudulent airspace vector of the user behavior data, a kth-1 fraudulent time domain vector of the user behavior data, and a kth-1 directed path relationship of the user behavior data from a kth-1 fraudulent knowledge vector of the user behavior data;
Extracting a kth-1 fraudulent spatial vector of each of the other user behavior data and a kth-1 fraudulent time domain vector of each of the other user behavior data from a kth-1 fraudulent knowledge vector of each of the other user behavior data;
the following steps are performed for each of the other user behavior data:
extracting a kth-1 directed path relation of the user behavior data for the other user behavior data from the kth-1 directed path relation of the user behavior data;
acquiring a first vector distance between a kth-1 fraudulent airspace vector of the user behavior data and a kth-1 fraudulent airspace vector of the other user behavior data;
and performing first vector fusion on the square of the first vector distance, the k-1 fraud time domain vector of the user behavior data, the k-1 fraud time domain vector of the other user behavior data and the k-1 directed path relation of the user behavior data to the other user behavior data to obtain the k directed relation vector of the user behavior data corresponding to the other user behavior data.
In a possible implementation manner of the first aspect, the performing the second vector mapping on the kth-1 fraudulent knowledge vector of the user behavior data and the kth directional relation vector of the user behavior data corresponding to each of the other user behavior data to obtain the kth fraudulent knowledge vector of the user behavior data includes:
Fusing the kth directed relation vector of the user behavior data corresponding to a plurality of other user behavior data to obtain the kth directed relation vector of the user behavior data;
performing second vector fusion on the kth-1 fraudulent time domain vector of the user behavior data and the kth directed relation vector of the user behavior data to obtain the kth fraudulent time domain vector of the user behavior data;
Acquiring a first vector distance between a kth-1 fraudulent airspace vector of the user behavior data and a kth-1 fraudulent airspace vector of each other user behavior data;
Vector mapping is carried out on the kth directed relation vector of the user behavior data corresponding to each other user behavior data, and behavior influence coefficients of each other user behavior data are obtained;
According to the behavior influence coefficients of the other user behavior data, performing weight fusion calculation on the first vector distances of the plurality of other user behavior data to obtain fusion calculation data corresponding to the user behavior data;
Fusing the fused calculation data of the user behavior data with the k-1 fraudulent airspace vector of the user behavior data to obtain the k fraudulent airspace vector of the user behavior data;
And taking the initial directed path relation of the user behavior data as a kth directed path relation of the user behavior data, and forming a kth fraud knowledge vector of the user behavior data by the kth directed path relation of the user behavior data, a kth fraud time domain vector of the user behavior data and a kth fraud space vector of the user behavior data.
In a possible implementation manner of the first aspect, the performing, by the k+1-th fraud knowledge description unit, fraud time domain vector extraction on the k-th fraud knowledge vector of each of the user behavior data to obtain a k+1-th fraud time domain vector of each of the user behavior data includes:
Extracting a kth fraud airspace vector of the user behavior data, a kth fraud time domain vector of the user behavior data and a kth directed path relation of the user behavior data from kth fraud knowledge vectors of the user behavior data;
For each piece of user behavior data, acquiring other pieces of user behavior data except the user behavior data in the user behavior directed graph data, and executing the following steps for each piece of other pieces of user behavior data:
Extracting a kth directed path relation of the user behavior data aiming at the other user behavior data from the kth directed path relation of the user behavior data, and acquiring a second vector distance between a kth fraudulent airspace vector of the user behavior data and a kth fraudulent airspace vector of the other user behavior data;
Performing a first vector fusion on the square of the second vector distance, a kth fraud time domain vector of the user behavior data, a kth fraud time domain vector of the other user behavior data, and a kth directed path relation of the user behavior data with respect to the other user behavior data to obtain a kth+1 directed relation vector of the user behavior data corresponding to the other user behavior data;
Fusing the k+1th directional relation vector of the user behavior data corresponding to a plurality of other user behavior data to obtain the k+1th directional relation vector of the user behavior data;
and carrying out second vector fusion on the kth fraud time domain vector of the user behavior data and the kth+1 directional relation vector of the user behavior data to obtain the kth+1 fraud time domain vector of the user behavior data.
In a possible implementation manner of the first aspect, before performing fraud tag bias value estimation on the user behavior directed graph data of the target financial service user based on the fraud analysis neural network to obtain a fraud tag bias value of the target financial service user, the method further includes:
Acquiring template user behavior directed graph data, and performing feature derivation on the template user behavior directed graph data to acquire a plurality of template derived behavior directed graph data;
acquiring fraud tag deviation labeling values of the template derived behavior directed graph data;
forward transmitting each template-derived behavior directed graph data in an initial fraud analysis neural network to obtain fraud label deviation prediction values of each template-derived behavior directed graph data;
Determining global training cost values according to the fraud tag deviation labeling values of the template-derived behavior directed graph data and the fraud tag deviation predicting values of the template-derived behavior directed graph data;
Performing back propagation processing on the global training cost value in the initial fraud analysis neural network to obtain network weight updating information of the initial fraud analysis neural network when the global training cost value converges, and updating the network weight information of the initial fraud analysis neural network according to the network weight updating information;
the obtaining the fraud tag deviation labeling value of each template derived behavior directed graph data comprises the following steps:
the following steps are executed for each template derived behavior directed graph data:
Performing a first fraud tag value estimation strategy on the template-derived behavior directed graph data to obtain a first fraud tag value of the template-derived behavior directed graph data; performing a second fraud tag value estimation strategy on the template-derived behavior directed graph data to obtain a second fraud tag value of the template-derived behavior directed graph data;
Acquiring a first loss value between a second fraud tag value of the template-derived behavior directed graph data and a first fraud tag value of the template-derived behavior directed graph data as a fraud tag deviation labeling value of the template-derived behavior directed graph data;
the determining the global training cost value according to the fraud tag deviation labeling value of each template derived behavior directed graph data and the fraud tag deviation predicting value of each template derived behavior directed graph data comprises the following steps:
the following steps are executed for each template derived behavior directed graph data:
Determining a first root mean square loss value of the template-derived behavior directed graph data according to the fraud tag deviation labeling value of the template-derived behavior directed graph data and the fraud tag deviation predicting value of the template-derived behavior directed graph data;
acquiring other template-derived behavior directed graph data except for the template-derived behavior directed graph data of the template user behavior directed graph data;
The following steps are performed for each of the other template-derived behavioral directed graph data: determining a second loss value between the fraud tag deviation labeling value of the template-derived directed graph data and the fraud tag deviation labeling value of the other template-derived directed graph data, and determining a third loss value between the fraud tag deviation prediction value of the template-derived directed graph data and the fraud tag deviation prediction value of the other template-derived directed graph data;
performing root mean square calculation on the second loss value and the third loss value to obtain a second root mean square loss value of the other template-derived behavior directed graph data corresponding to the template-derived behavior directed graph data;
Fusing the second root mean square loss values of the template-derived behavior directed graph data corresponding to a plurality of other template-derived behavior directed graph data to obtain a third root mean square loss value of the template-derived behavior directed graph data;
and carrying out third vector fusion on the first root mean square loss values of the plurality of template-derived behavior directed graph data and the third root mean square loss values of the plurality of template-derived behavior directed graph data to obtain global training cost values corresponding to the fraud analysis neural network.
In a second aspect, an embodiment of the present application further provides an artificial intelligence-based fraud analysis system, where the artificial intelligence-based fraud analysis system includes a digital financial big data system and a plurality of digital financial service terminals communicatively connected to the digital financial big data system;
the digital financial big data system is used for:
Acquiring user behavior directed graph data of a target financial service user;
Based on the fraud analysis neural network, fraud label deviation value estimation is carried out on the user behavior directed graph data of the target financial service user, so as to obtain fraud label deviation values of the target financial service user; the fraud analysis neural network is generated by updating network weight parameters by combining fraud tag deviation values of template user behavior directed graph data, wherein the fraud tag deviation values of the template user behavior directed graph data are used for representing fraud tag loss values obtained when fraud tag values of the template user behavior directed graph data are calculated according to two fraud tag value estimation strategies respectively, the two fraud tag value estimation strategies comprise a first fraud tag value estimation strategy and a second fraud tag value estimation strategy, the accuracy score of the first fraud tag value estimation strategy is smaller than the accuracy score of the second fraud tag value estimation strategy, and the estimated performance value of the first fraud tag value estimation strategy is larger than the estimated performance value of the second fraud tag value estimation strategy;
Performing the first fraud tag value estimation strategy on the user behavior directed graph data of the target financial service user to obtain a first fraud tag value of the target financial service user;
and optimizing the deviation value of the first fraud tag value of the target financial service user according to the fraud tag deviation value of the target financial service user to obtain a second fraud tag value of the target financial service user.
In a third aspect, embodiments of the present application also provide a digital financial big data system comprising a processor and a machine-readable storage medium having stored therein a computer program loaded and executed in conjunction with the processor to implement the artificial intelligence based fraud analysis method of the first aspect above.
In a fourth aspect, embodiments of the present application provide a computer readable storage medium storing computer executable instructions for execution by a processor to implement the artificial intelligence based fraud analysis method of the first aspect above.
In a fifth aspect, embodiments of the present application provide a computer program product comprising a computer program or computer executable instructions which, when executed by a processor, implement the artificial intelligence based fraud analysis method of the first aspect above.
The embodiment of the application has at least the following beneficial effects:
The first fraud tag value of the target financial service user is obtained by carrying out a first fraud tag value estimation strategy on the user behavior directed graph data of the target financial service user, and the estimated performance value of the first fraud tag value estimation strategy is higher than that of the second fraud tag value estimation strategy, so that the estimated performance value of the fraud tag value estimation strategy is improved, the user behavior directed graph data of the target financial service user is subjected to fraud tag deviation value estimation through a fraud behavior analysis neural network, the fraud tag deviation value of the target financial service user is obtained, and the determined first fraud tag value is subjected to deviation value optimization according to the fraud tag deviation value, so that the second fraud tag value of the target financial service user is obtained.
Detailed Description
The present application will be further described in detail with reference to the accompanying drawings, for the purpose of making the objects, technical solutions and advantages of the present application more apparent, and the described embodiments should not be construed as limiting the present application, and all other embodiments obtained by those skilled in the art without making any inventive effort are within the scope of the present application.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The terminology used in the embodiments of the application is for the purpose of describing embodiments of the application only and is not intended to be limiting of the application.
It should be noted that, all kinds of data obtained in the following embodiments are obtained on the basis of obtaining the authorized license of the user.
See fig. 1:
In step S101, user behavior directed graph data of a target financial service user is acquired.
In an alternative embodiment, the target financial service user includes at least one user behavior data, and for the target financial service user having a plurality of user behavior data, the user behavior directed graph data is a knowledge graph structure formed by the plurality of user behavior data and at least one user behavior directed relationship (a behavior a trigger relationship, a behavior linkage relationship, etc.).
In step S102, the fraud tag deviation value estimation is performed on the user behavior directed graph data of the target financial service user based on the fraud behavior analysis neural network, and the fraud tag deviation value of the target financial service user is obtained.
In an alternative embodiment, the fraud vector description is performed on the user behavior directed graph data of the target financial service user by means of a fraud analysis neural network, a fraud tag deviation vector is obtained, and the fraud tag deviation vector is mapped to a fraud tag loss value obtained when the fraud tag value calculation is performed on the target financial service user by means of two preset fraud tag value estimation strategies, the fraud analysis neural network is based on the vector mapping, and the fraud tag deviation value is obtained in combination, the fraud tag value calculation is not actually performed on the target financial service user by means of two given fraud tag value estimation strategies, because the functions that can be implemented by the fraud analysis neural network depend on the network learning mode, the fraud analysis neural network is generated by performing the network weight parameter update in combination with the fraud tag deviation value of the fraud template user behavior directed graph data, the fraud tag deviation value of the template user behavior directed graph data refers to a fraud tag loss value obtained when fraud tag values of the template user behavior directed graph data are calculated according to two fraud tag value estimation strategies respectively, the fraud tag value estimation strategies are used for reflecting a mode of carrying out fraud tag value calculation on given user behavior directed graph data, the two fraud tag value estimation strategies comprise a first fraud tag value estimation strategy and a second fraud tag value estimation strategy, the accuracy score of the first fraud tag value estimation strategy is smaller than that of the second fraud tag value estimation strategy, and the estimated performance value of the first fraud tag value estimation strategy is larger than that of the second fraud tag value estimation strategy.
In step S103, a first fraud tag value estimation policy is performed on the user behavior directed graph data of the target financial service user, to obtain a first fraud tag value of the target financial service user.
In step S104, the bias value optimization is performed on the first bias value of the target financial service user according to the bias value of the bias label of the target financial service user, so as to obtain the second bias value of the bias label of the target financial service user.
In an alternative embodiment, the bias value optimization refers to adding or subtracting the first fraud tag value and the fraud tag bias value, when the fraud tag bias value is used to reflect a fraud tag loss value between the first fraud tag value estimation policy and the second fraud tag value estimation policy, the bias value optimization is to subtract the first fraud tag value and the fraud tag bias value to obtain a second fraud tag value for the target financial service user, and when the fraud tag bias value is used to reflect a fraud tag loss value between the second fraud tag value estimation policy and the first fraud tag value estimation policy, the bias value optimization is to add the first fraud tag value and the fraud tag bias value to obtain a second fraud tag value for the target financial service user.
In an alternative embodiment, the fraud tag deviation value estimation performed on the user behavior directed graph data of the target financial service user based on the fraud analysis neural network in step S102, and obtaining the fraud tag deviation value of the target financial service user may be implemented in steps S1021 to S1022 described below.
In step S1021, the user behavior directed graph data is subjected to fraud vector description through the fraud analysis neural network, and a fraud tag deviation vector of the target financial service user is obtained.
In step S1022, the fraud tag bias vector is subjected to fraud tag bias value estimation by the fraud analysis neural network, and a fraud tag bias value of the target financial service user is obtained.
The fraud tag deviation vector of the user behavior directed graph data is extracted, and the fraud tag deviation value of the target financial service user is predicted according to the fraud tag deviation vector, so that the fraud tag loss value of the fraud tag value of the user behavior directed graph data of the target financial service user can be calculated by combining two fraud tag value estimation strategies.
In an alternative embodiment, the fraud analysis neural network includes K fraud knowledge description units connected in sequence, and in step S1021, fraud vector description is performed on the user behavior directed graph data by the fraud analysis neural network, so as to obtain a fraud tag deviation vector of the target financial service user, which may be implemented based on the following steps a to C.
In the step A, basic fraud knowledge vector description is carried out on each user behavior data in the user behavior directed graph data, and basic fraud knowledge vectors of each user behavior data are obtained.
In an alternative embodiment, when the target financial service user E includes three user behavior data (user behavior data a, user behavior data B, and user behavior data C) and one behavior directed relationship (the user behavior data a and the user behavior data B are connected by the behavior directed relationship), basic fraud knowledge vector description is performed for each user behavior data, a basic fraud time domain vector of each user behavior data in the user behavior directed graph data is obtained, the basic fraud time domain vector is used for reflecting a time sequence vector of the user behavior data, and a basic fraud airspace vector of each user behavior data in the user behavior directed graph data is obtained, and the basic fraud airspace vector is used for reflecting a spatial sequence vector of the user behavior data. The following steps are performed for each user behavior data in the user behavior directed graph data, for example, the following steps are performed for the user behavior data a: obtaining at least one other user behavior data (namely user behavior data B and user behavior data C) except the user behavior data A in the user behavior directed graph data, obtaining an initial directed path relation between the user behavior data and each other user behavior data, wherein the initial directed path relation is used for reflecting a behavior flow direction relation between the user behavior data and the other user behavior data, the initial directed path relation is used for reflecting a behavior flow direction relation between the user behavior data A and the user behavior data B and a behavior flow direction relation between the user behavior data A and the user behavior data C, two behavior flow direction relations exist, and a behavior flow direction relation and a no behavior flow direction relation, if the two user behavior data are connected through the behavior directed relation, the two user behavior data have the behavior flow direction relation, and if the two user behavior data are not connected through the behavior directed relation, the basic fraud time domain vector of each user behavior data, the basic fraud vector of each user behavior data and the initial directed path relation of each user behavior data form the basic fraud time domain vector of each user behavior data.
The basic fraud time domain vector, the initial directed path relationship and the basic fraud airspace vector are formed into a basic fraud knowledge vector, which not only can be used for reflecting the behavior category of the user behavior data, but also can be used for reflecting the relative behavior node of the user behavior data and the connection condition of the directed relationship through behavior, thereby effectively improving the characteristic expression capability of the basic fraud knowledge vector.
In the step B, when K is 1-K-2, carrying out kth fraud vector description on the loading data of the kth fraud knowledge description unit based on the kth fraud knowledge description unit in the K fraud knowledge description units which are connected in sequence to obtain kth fraud knowledge vectors of all user behavior data, and loading the kth fraud knowledge vectors to the kth+1 fraud knowledge description unit to continue carrying out kth+1 fraud vector description.
In an alternative embodiment, K is 2.ltoreq.K, K is a positive integer with a value gradually increasing from 1, and K is 1.ltoreq.k-1; and when K is 1, the loading data of the kth fraud knowledge description unit is a basic fraud knowledge vector of the behavior data of each user, and when K is 2-K-1, the loading data of the kth fraud knowledge description unit is a kth-1 fraud knowledge vector of the behavior data of each user output by the kth-1 fraud knowledge description unit.
In an alternative embodiment, assuming that K has a value of 3, the following steps are still performed taking the user behavior data a as an example: and carrying out 1 st fraud vector description on the basic fraud knowledge vector of the user behavior data A through a1 st fraud knowledge description unit to obtain a1 st fraud knowledge vector of the user behavior data A, loading the 1 st fraud knowledge vector into a 2 nd fraud knowledge description unit to continue carrying out 2 nd fraud vector description, and carrying out 2 nd fraud vector description on the 1 st fraud knowledge vector of the user behavior data A through the 2 nd fraud knowledge description unit to obtain a 2 nd vector of the user behavior data A.
In step C, in response to K being K-1, the k+1-th fraud knowledge description unit is used for carrying out fraud time domain vector extraction on the K-th fraud knowledge vector of each user behavior data to obtain the k+1-th fraud time domain vector of each user behavior data, the k+1-th fraud knowledge vector of each user behavior data is used for carrying out fraud space domain vector extraction on the K-th fraud knowledge vector of each user behavior data to obtain the k+1-th fraud space domain vector of each user behavior data, and the k+1-th fraud time domain vector and the k+1-th fraud space domain vector of each user behavior data are combined into a fraud tag deviation vector.
In an alternative embodiment, assuming that K has a value of 3, the following steps are still performed taking the user behavior data a as an example: and 3 rd fraudulent time domain vector extraction is carried out on the 2 nd vector of the user behavior data A through a 3 rd fraudulent knowledge description unit, the 3 rd fraudulent time domain vector of the user behavior data A is obtained, 3 rd fraudulent space vector extraction is carried out on the 2 nd vector of the user behavior data A through the 3 rd fraudulent knowledge description unit, the 3 rd fraudulent space vector of the user behavior data A is obtained, and the 3 rd fraudulent time domain vector of the user behavior data A and the 3 rd fraudulent space vector of the user behavior data A are used as fraud tag deviation vectors.
The fraudulent airspace vector of each user behavior data and the fraudulent time domain vector of each user behavior data can be obtained through iteration steps, and then the fraudulent airspace vectors of a plurality of user behavior data and the fraudulent time domain vectors of a plurality of user behavior data are formed into a fraudulent label deviation vector, so that the vector expression capacity of the fraudulent label deviation vector is improved, and the accuracy score of the follow-up fraudulent label deviation predicted value is improved.
In an alternative embodiment, the kth fraud knowledge description unit in the kth fraud knowledge description unit is used for carrying out kth fraud vector description on the loading data of the kth fraud knowledge description unit in the step B based on the kth fraud knowledge description units in the K fraud knowledge description units, so as to obtain the kth fraud knowledge vector of each user behavior data, and the following steps can be executed on each user behavior data (taking the user behavior data a in the target financial service user E as an example for illustration) through the kth fraud knowledge description unit.
In step B1, other user behavior data than the user behavior data in the user behavior directed graph data, still taking the target financial service user E as an example, are obtained, and the other user behavior data are other user behavior data B than the user behavior data a and other user behavior data C.
In step B2, a first vector mapping is performed on the kth-1 fraudulent knowledge vector of the user behavior data and the kth-1 fraudulent knowledge vector of each other user behavior data to obtain a kth directed relation vector of the user behavior data corresponding to each other user behavior data.
Extracting a kth-1 fraudulent airspace vector of the user behavior data from a kth-1 fraudulent knowledge vector of the user behavior data, and extracting a kth-1 fraudulent airspace vector of each other user behavior data from a kth-1 fraudulent knowledge vector of each other user behavior data; extracting a kth-1 fraudulent time domain vector of the user behavior data from the kth-1 fraudulent knowledge vector of the user behavior data, and extracting a kth-1 fraudulent time domain vector of each other user behavior data from the kth-1 fraudulent knowledge vector of each other user behavior data; extracting a kth-1 directed path relation of the user behavior data from a kth-1 fraud knowledge vector of the user behavior data; the following steps are performed for each other user behavior data (hereinafter, user behavior data B is taken as an example): extracting the kth-1 directed path relation of the user behavior data aiming at other user behavior data from the kth-1 directed path relation of the user behavior data; acquiring a first vector distance between a kth-1 fraudulent airspace vector of user behavior data and a kth-1 fraudulent airspace vector of other user behavior data; and performing first vector fusion on the square of the first vector distance, the k-1 fraud time domain vector of the user behavior data, the k-1 fraud time domain vector of other user behavior data and the k-1 directed path relation of the user behavior data aiming at the other user behavior data to obtain a k directed relation vector of the user behavior data corresponding to the other user behavior data.
The vector distance between any two user behavior data and the behavior flow direction relation of any two user behavior data are combined into the directed relation vector, so that the directed relation vector can learn the global information of the user behavior directed graph data, and the characteristic learning performance of the fraudulent analysis neural network can be improved.
In an alternative embodiment, assuming K is 3, still taking user behavior data a and other user behavior data B as an example, the 2 nd fraudulent airspace vector of user behavior data a is extracted from the 2 nd vector of user behavior data a, the 2 nd fraudulent airspace vector of user behavior data B is extracted from the 2 nd vector of user behavior data B, the 2 nd fraudulent time domain vector of user behavior data is extracted from the 2 nd vector of user behavior data a, and the 2 nd fraudulent time domain vector of user behavior data B is extracted from the 2 nd vector of user behavior data B. The kth-1 directional path relationship is an initial directional path relationship, that is, the directional path relationship is not changed due to vector iteration, the 2 nd directional path relationship of the user behavior data a (the initial directional path relationship of the user behavior data a) is extracted from the 2 nd vector of the user behavior data a, and the 2 nd directional path relationship of the user behavior data (the initial directional path relationship of the user behavior data B) is extracted from the 2 nd vector of the user behavior data B.
In step B3, a second vector mapping is performed on the kth-1 fraudulent knowledge vector of the user behavior data and the kth directed relation vector of the user behavior data corresponding to each other user behavior data, so as to obtain the kth fraudulent knowledge vector of the user behavior data.
Fusing the kth directed relation vector of the user behavior data corresponding to a plurality of other user behavior data to obtain the kth directed relation vector of the user behavior data; performing second vector fusion on the kth-1 fraudulent time domain vector of the user behavior data and the kth directed relation vector of the user behavior data to obtain the kth fraudulent time domain vector of the user behavior data; acquiring a first vector distance between a kth-1 fraudulent airspace vector of user behavior data and a kth-1 fraudulent airspace vector of each other user behavior data; vector mapping is carried out on the kth directed relation vector of the user behavior data corresponding to each other user behavior data, and behavior influence coefficients of each other user behavior data are obtained; according to the behavior influence coefficient of each other user behavior data, performing weight fusion calculation on the first vector distances of the plurality of other user behavior data to obtain fusion calculation data of the corresponding user behavior data; fusing the fused calculation data of the user behavior data with the k-1 fraudulent airspace vector of the user behavior data to obtain the k fraudulent airspace vector of the user behavior data; taking the initial directed path relation of the user behavior data as the kth directed path relation of the user behavior data; and forming a kth fraud knowledge vector of the user behavior data by the kth directed path relation of the user behavior data, the kth fraud time domain vector of the user behavior data and the kth fraud space domain vector of the user behavior data.
By combining the vector distance between any two user behavior data and the behavior flow direction relation of any two user behavior data into the kth fraud knowledge vector, the kth fraud knowledge vector can learn global information of the user behavior directed graph data, and the characteristic learning performance of the fraud behavior analysis neural network can be improved.
In an alternative embodiment, a first vector distance between a kth-1 fraudulent airspace vector of user behavior data A and a kth-1 fraudulent airspace vector of other user behavior data (other user behavior data B and other user behavior data C) is obtained; taking the kth directional relation vector of the user behavior data A corresponding to each other user behavior data (other user behavior data B and other user behavior data C) as a weight, and carrying out weight fusion calculation on first vector distances of a plurality of other user behavior data (other user behavior data B and other user behavior data C) to obtain fusion calculation data corresponding to the user behavior data A; and fusing the fused calculation data of the user behavior data A with the k-1 fraudulent airspace vector of the user behavior data A to obtain the k fraudulent airspace vector of the user behavior data A.
In an alternative embodiment, the initial directed path relation of the user behavior data a is taken as the kth directed path relation of the user behavior data a; and forming a kth fraud knowledge vector of the user behavior data by using the kth directed path relation aij of the user behavior data A corresponding to each other user behavior data, the kth fraud time domain vector of the user behavior data A and the kth fraud space vector of the user behavior data A.
In an alternative embodiment, in step C, the kth fraud knowledge vector of each user behavior data is extracted by the kth+1 fraud knowledge description unit to obtain the kth+1 fraud time domain vector of each user behavior data, which may specifically be: extracting a kth fraud airspace vector of the user behavior data, a kth fraud time domain vector of the user behavior data and a kth directed path relation of the user behavior data from kth fraud knowledge vectors of the user behavior data; the following steps are performed for each user behavior data: acquiring other user behavior data except the user behavior data in the user behavior directed graph data, and executing the following steps aiming at each other user behavior data: extracting a kth directed path relation of the user behavior data aiming at other user behavior data from a kth directed path relation of the user behavior data, and acquiring a second vector distance between a kth fraudulent airspace vector of the user behavior data and a kth fraudulent airspace vector of other user behavior data; performing first vector fusion on the square of the second vector distance, a kth fraud time domain vector of the user behavior data, a kth fraud time domain vector of other user behavior data and a kth directed path relation of the user behavior data aiming at other user behavior data to obtain a kth+1 directed relation vector of the user behavior data corresponding to other user behavior data; fusing the k+1th directional relation vector of the user behavior data corresponding to a plurality of other user behavior data to obtain the k+1th directional relation vector of the user behavior data; and carrying out second vector fusion on the kth fraud time domain vector of the user behavior data and the kth+1 directional relation vector of the user behavior data to obtain the kth+1 fraud time domain vector of the user behavior data.
In an alternative embodiment, the kth fraudulent spatial vector of the user behavior data and the kth directional path relation of the user behavior data are extracted from kth fraudulent knowledge vectors of the user behavior data, specifically, assuming that K has a value of 3, taking the user behavior data a, the user behavior data B and the user behavior data C as an example, the following steps are still performed, the 2 nd fraudulent spatial vector of the user behavior data is extracted from the 2 nd vector of the user behavior data a, the 2 nd fraudulent spatial vector of the user behavior data B is extracted from the 2 nd vector of the user behavior data B, the 2 nd fraudulent spatial vector of the user behavior data C is extracted from the 2 nd vector of the user behavior data C, the 2 nd fraudulent temporal vector of the user behavior data is extracted from the 2 nd vector of the user behavior data B, and the 2 nd fraudulent spatial vector of the user behavior data C is extracted from the 2 nd vector of the user behavior data C. The kth directional path relationship is an initial directional path relationship, that is, the directional path relationship is not changed due to vector iteration, the 2 nd directional path relationship of the user behavior data (the initial directional path relationship of the user behavior data a) is extracted from the 2 nd vector of the user behavior data a, the 2 nd directional path relationship of the user behavior data (the initial directional path relationship of the user behavior data B) is extracted from the 2 nd vector of the user behavior data B, and the 2 nd directional path relationship of the user behavior data (the initial directional path relationship of the user behavior data C) is extracted from the 2 nd vector of the user behavior data C.
In an alternative embodiment, before the fraud tag deviation value estimation is performed on the user behavior directed graph data of the target financial service user based on the fraud analysis neural network, the steps S105 to S109 may be further performed, so as to obtain the fraud tag deviation value of the target financial service user.
In step S105, template user behavior directed graph data is acquired, and feature derivation is performed on the template user behavior directed graph data, so as to obtain a plurality of template derived behavior directed graph data.
In step S106, a fraud tag deviation label value of each template-derived behavior directed graph data is acquired.
In an alternative embodiment, the acquiring the fraud tag deviation label value of each template derived behavior directed graph data in step S106 may specifically be: the following steps are performed for each template-derived behavioral directed graph data: performing a first fraud tag value estimation strategy on the template-derived behavior directed graph data to obtain a first fraud tag value of the template-derived behavior directed graph data; performing a second fraud tag value estimation strategy on the template-derived behavior directed graph data to obtain a second fraud tag value of the template-derived behavior directed graph data; and acquiring a second fraud tag value of the template user behavior directed graph data and a first loss value of a first fraud tag value of the template user behavior directed graph data as fraud tag deviation labeling values of the template derived behavior directed graph data.
In step S107, the template-derived behavior directed graph data is forward-propagated in the initial fraud analysis neural network, and fraud tag deviation prediction values of the template-derived behavior directed graph data are obtained.
In an alternative embodiment, the fraud vector description is performed on the user behavior directed graph data through an initial fraud analysis neural network to obtain a fraud tag deviation vector of the target financial service user; and performing fraud tag deviation value estimation on the fraud tag deviation vector through the initial fraud analysis neural network to obtain a fraud tag deviation value of the target financial service user. Specific implementation of the initial fraud analysis neural network may be found in the foregoing description.
In step S108, the global training cost value of the corresponding fraud analysis neural network is determined according to the fraud label deviation labeling value of each template-derived behaviour directed graph data and the fraud label deviation prediction value of each template-derived behaviour directed graph data.
In an alternative embodiment, in step S108, the global training cost value of the corresponding fraud analysis neural network is determined according to the fraud label deviation labeling value of each template-derived behavior directed graph data and the fraud label deviation prediction value of each template-derived behavior directed graph data, which may specifically be: the following steps are performed for each template-derived behavioral directed graph data: determining a first root mean square loss value of the template-derived directed graph data according to the fraud tag deviation labeling value of the template-derived directed graph data and the fraud tag deviation predicted value of the template-derived directed graph data; acquiring other template-derived behavior directed graph data except for the template-derived behavior directed graph data of the template user behavior directed graph data; the following steps are performed for each other template-derived behavioral directed graph data: determining a second loss value between the fraud tag deviation labeling value of the template-derived behavior directed graph data and the fraud tag deviation labeling value of the other template-derived behavior directed graph data, and determining a third loss value between the fraud tag deviation prediction value of the template-derived behavior directed graph data and the fraud tag deviation prediction value of the other template-derived behavior directed graph data; performing root mean square calculation on the second loss value and the third loss value to obtain a second root mean square loss value of the template-derived behavior directed graph data corresponding to other template-derived behavior directed graph data; fusing second root mean square loss values of the template derived behavior directed graph data corresponding to a plurality of other template derived behavior directed graph data to obtain third root mean square loss values of the template derived behavior directed graph data; and carrying out third vector fusion on the first root mean square loss value of the plurality of template derived behavior directed graph data and the third root mean square loss value of the plurality of template user behavior directed graph data to obtain the global training cost value of the corresponding fraud analysis neural network.
In step S109, the global training cost value is back-propagated in the fraud analysis neural network, so as to obtain the network weight update information of the fraud analysis neural network when the global training cost value converges, and the network weight information of the fraud analysis neural network is updated according to the network weight update information.
In one possible embodiment, a digital financial big data system, which may be a server, is provided that includes a processor, a memory, an Input/Output interface (I/O) and a communication interface. The processor, the memory and the input/output interface are connected through a system bus, and the communication interface is connected to the system bus through the input/output interface. Wherein the processor of the digital financial big data system is configured to provide computing and control capabilities. The memory of the digital financial big data system comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the digital financial big data system is used for storing the data related to the method. The model loading data/output interface of the digital financial big data system is used for exchanging information between the processor and the external equipment. The communication interface of the digital financial big data system is used for communicating with an external terminal through network connection. The computer program, when executed by a processor, implements an artificial intelligence based fraud analysis method.
In some design considerations, a digital financial big data system is provided, which may be a terminal. The digital financial big data system comprises a processor, a memory, an input/output interface, a communication interface, a display unit and an input device. The processor, the memory and the input/output interface are connected through a system bus, and the communication interface, the display unit and the input device are connected to the system bus through the input/output interface. Wherein the processor of the digital financial big data system is configured to provide computing and control capabilities. The memory of the digital financial big data system comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The model loading data/output interface of the digital financial big data system is used for exchanging information between the processor and the external equipment. The communication interface of the digital financial big data system is used for carrying out wired or wireless communication with an external terminal, and the wireless mode can be realized through WIFI, a mobile cellular network, NFC (near field communication) or other technologies. The computer program, when executed by a processor, implements an artificial intelligence based fraud analysis method. The display unit of the digital financial big data system is used for forming a visual picture.
In some design considerations, a digital financial big data system is provided, comprising a memory and a processor, the memory storing a computer program, the processor implementing the steps of the method embodiments described above when executing the computer program.
In some design considerations, a computer readable storage medium is provided, on which a computer program is stored, which, when executed by a processor, implements the steps of the method embodiments described above.
In some design considerations, a computer program product is provided, comprising a computer program which, when executed by a processor, implements the steps of the method embodiments described above.
The foregoing examples illustrate only a few embodiments of the application and are described in detail herein without thereby limiting the scope of the application. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the application, which are all within the scope of the application. Accordingly, the scope of the application should be assessed as that of the appended claims.