Trusted electronic transaction release mechanism based on generative adversarial network

An electronic transaction and network technology, applied in the direction of biological neural network model, payment system, agreement authorization, etc., can solve the problem of time-consuming prediction process

Pending Publication Date: 2019-07-05
TONGJI UNIV
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the transaction data of Internet finance, fraudulent data usually account for a very small proportion, because most of the user's transactions are normal, and only a very small part of them is fraudulent, and most of the methods in this field It is to catch thieves, that is, to predict fraudulent data, but the prediction process is usually very time-consuming. We know that time is loss. The faster you can find fraudulent transactions, the sooner you can avoid user losses. The prediction model is more time-consuming. It is almost impossible to train a model that can predict fraudulent transactions when the fraudulent and non-fraudulent data are extremely imbalanced.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted electronic transaction release mechanism based on generative adversarial network
  • Trusted electronic transaction release mechanism based on generative adversarial network
  • Trusted electronic transaction release mechanism based on generative adversarial network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The present invention incorporates the Long Short Term Memory network (Long Short Term Memory) under the framework of the existing Generative Adversarial Network, that is, the generation model and the discriminant model in the Generative Adversarial Network are two different LSTM neural networks respectively, and the Generative Adversarial Network in the image Fields such as generation play an important role, and LSTM plays an important role in fields such as natural language processing. However, there is no literature that integrates generative adversarial networks and LSTMs and uses them in anti-fraud research on Internet financial data. The specific structure of the generative confrontation network and LSTM will be introduced in detail later. The online transaction fraud real-time detection method of the generative confrontation network of the present invention has four modules, which are: 1. Preprocessing; 2. Modeling; 3. Training ; 4. Release.

[0021] The main fun...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a trusted electronic transaction release mechanism based on a generative adversarial network. The method is characterized by comprising, the transaction distribution of normalusers is learnt by using the generative adversarial network by using a large amount of non-fraudulent data based on a reverse idea; the obtained discrimination model can better identify non-fraud data, so that a release mechanism can be adopted for credible electronic transactions, and the remaining data which cannot be discriminated are delivered to the prediction model for prediction, so that alarge amount of time can be saved.

Description

technical field [0001] The invention relates to anti-fraud detection of Internet financial network payment. Background technique [0002] The mobile Internet is a double-edged sword. While it brings convenience to people's lives, it also brings various hidden dangers. For example, the payment platform for online transactions allows people to shop without leaving home or even anytime, anywhere. And payment, but this convenience and speed also give some unscrupulous attackers an opportunity. Attackers steal users' account information, steal users' personal privacy information, and even pretend to be users themselves to conduct transactions or transfers to complete fraud. Therefore, in order to effectively protect the personal interests of users and companies, it is necessary to establish an effective network payment fraud detection system. [0003] In the transaction data of Internet finance, fraudulent data usually account for a very small proportion, because most of the use...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/40G06Q40/04G06N3/04G06N3/08
CPCG06Q20/4016G06Q40/04G06N3/084G06N3/045
Inventor 王成胡腾
Owner TONGJI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products