Malicious user identification method and device, computer storage medium and electronic equipment

A malicious user and identification method technology, applied in the computer field, can solve problems such as poor identification effect and failure of test statistics to reach the optimal value

Active Publication Date: 2021-08-31
BEIJING WODONG TIANJUN INFORMATION TECH CO LTD +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the resulting test statistic cannot reach the optimal value, and the recognition effect is poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious user identification method and device, computer storage medium and electronic equipment
  • Malicious user identification method and device, computer storage medium and electronic equipment
  • Malicious user identification method and device, computer storage medium and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete and will fully convey the concept of example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided in order to give a thorough understanding of embodiments of the present disclosure. However, those skilled in the art will appreciate that the technical solutions of the present disclosure may be practiced without one or more of the specific details being omitted, or other methods, components, devices, steps, etc. may be adopted. In other instances, well-known technical solution...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of computers, and provides a malicious user identification method, a malicious user identification device, a computer storage medium and electronic equipment, and the malicious user identification method comprises the steps: determining a product of a feature vector corresponding to shopping behavior data of a user and an unknown parameter as a credit score of the user; defining the difference between the probability that the credit score of the malicious user is less than the target threshold and the probability that the credit score of the non-malicious user is less than the target threshold as a test statistic, and determining the test statistic as a target function; based on the first assignment of the unknown parameter, optimizing the objective function by adopting an iterative algorithm to obtain an Nth assignment meeting the maximum objective function; when the Nth assignment and the (N-1) th assignment meet the preset relation, determining the product of the feature vector and the Nth assignment as the credit score of the user; and identifying whether the user is a malicious user according to the value of the credit score. According to the method, the recognition accuracy can be improved.

Description

technical field [0001] The present disclosure relates to the field of computer technology, and in particular to a malicious user identification method, a malicious user identification device, a computer storage medium and electronic equipment. Background technique [0002] With the rapid development of computer and Internet technology, relevant Internet information acquisition platforms are also developing rapidly, and more and more consumers browse, select and purchase commodities through the Internet. However, based on the virtual nature of the network, consumers cannot truly experience the material and quality of the products. Therefore, most online shopping buyers mainly refer to the evaluation and sales of products in different stores when selecting products, and these data may be suspected of fraudulent ordering. (Swiping orders refers to the false sales behavior in which the seller pays someone to pretend to be a customer in electronic shopping to increase the sales o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1425H04L63/1441
Inventor 陈媛媛金姿
Owner BEIJING WODONG TIANJUN INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products