Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Fraudulent user detection model construction method based on graph attention network

A technology for detecting models and construction methods, applied in biological neural network models, neural learning methods, neural architectures, etc., can solve the problem of inability to further extract structural information, inability to automatically select user feature combinations, inability to extract global information about user-related information, etc. question

Active Publication Date: 2021-02-26
NANJING UNIV OF POSTS & TELECOMM
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are the following shortcomings: (1) It is impossible to extract the correlation information and global information between users, that is, the structural information cannot be extracted (2) Noise problem, large-scale text information often contains a lot of invalid information (3) The pooling strategy cannot Automatic selection of user feature combinations with contributions (4) does not effectively use user behavior features
In this way, the structural information between users can be extracted and the global information can be learned to solve the shortcomings (1) in the traditional model, but it cannot solve the shortcomings (2)(3)(4) in the traditional model, and because the graph is no weight undirected graph, so it is impossible to further extract structural information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fraudulent user detection model construction method based on graph attention network
  • Fraudulent user detection model construction method based on graph attention network
  • Fraudulent user detection model construction method based on graph attention network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] In order to make the purpose of the present invention, technical solutions and advantages clearer, the present invention will be further described in detail below in conjunction with the examples:

[0057] A method for constructing a fraudulent user detection model based on a graph attention network, comprising the following steps:

[0058] Step 1) Group all the information in the labeled user information dataset by product, and generate a dataset whose fields are product id, comment user id, and comment content.

[0059] Step 2) Import user information and perform preprocessing, use several features to describe the user's behavioral features and text features, so as to represent the user's commenting behavior.

[0060] Step 21) process the user information data set in step 1), extract 8 user behavior features and 4 text features, including the following steps Table 1 and Table 2;

[0061] Table 1: Based on user behavior characteristics

[0062] feature de...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a fraudulent user detection model construction method based on a graph attention network, and the method comprises the steps: firstly importing user information with a label, and separating the text content of a user; preprocessing the user information, and representing user behavior characteristics and text characteristics by using a plurality of characteristics; secondly,importing text content of a user, and calculating similarity between sentence embedding of user comments after the text content is preprocessed; constructing a user network by taking the user information features as vertexes and the comment relevancy as edges; and finally, learning the user network by using a graph convolution network, adaptively aggregating neighbor information in the graph convolution network by using an attention mechanism, and obtaining a model after repeated training. According to the method, the graph attention network is used for training on the user-user network, theglobal position information of the user in the network is deeply mined, neighbor weights are distributed in a self-adaptive mode, and therefore the accuracy and stability of model detection are improved.

Description

technical field [0001] The invention relates to a method for constructing a fraudulent user detection model based on a graph attention network, and belongs to the intersecting technical fields of fraud detection, natural language processing, graph neural network, and deep learning. Background technique [0002] The openness of the Internet and the monetary rewards of crowdsourcing tasks have stimulated a large number of fake users to write fake reviews and publish advertisements to interfere with users' judgment. Fraudulent users are characterized by subjectivity and diversification. Therefore, manual identification is difficult and costly, but the accuracy rate is not ideal. Therefore, there are two popular solutions in the industry, which are rule-based and deep learning-based. [0003] The rule-based method is mainly to classify users by analyzing and learning the behavior characteristics of users, and obtaining the classification rules of the characteristics. The method...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F16/33G06F16/35G06N3/04G06N3/08
CPCG06F16/3344G06F16/35G06N3/084G06N3/045
Inventor 任勋益黄家铭
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products