Access the full text.
Sign up today, get DeepDyve free for 14 days.
(2010)
ILMBP neural network model and its application in personal credit evaluation
Chih-Chung Chang, Chih-Jen Lin (2011)
LIBSVM: A library for support vector machinesACM Trans. Intell. Syst. Technol., 2
Computer Science
Zakria Mahrousa, Dima Alchawafa, Hasan Kazzaz (2021)
Frequent Itemset Mining Based on Development of FP-growth Algorithm and Use MapReduce Technique, 28
Journal of Hangzhou Dianzi University (Social Sciences)
(2018)
Evaluation of P2P lending bor-rower's credit on BP artificial neural network [J]
M. Ala’raj, M. Abbod (2016)
A new hybrid ensemble credit scoring model based on classifiers consensus system approachExpert Syst. Appl., 64
J. Wiginton (1980)
A Note on the Comparison of Logit and Discriminant Models of Consumer Credit BehaviorJournal of Financial and Quantitative Analysis, 15
(2020)
Financing risk prediction of science and technology enterprises based on sample weighted SVM model
C. Luo, Desheng Wu, Dexiang Wu (2017)
A deep learning approach for credit scoring using credit default swapsEng. Appl. Artif. Intell., 65
(2020)
Research on mobile user credit score based on LightGBM algorithm
Diederik Kingma, Jimmy Ba (2014)
Adam: A Method for Stochastic OptimizationCoRR, abs/1412.6980
(2017)
Personal credit scoring method using gradient boosting decision tree
(2013)
K.M.: Weisfeiler-Lehman graph kernels
Nitish Srivastava, Geoffrey Hinton, A. Krizhevsky, I. Sutskever, R. Salakhutdinov (2014)
Dropout: a simple way to prevent neural networks from overfittingJ. Mach. Learn. Res., 15
Liu Xi-ping (2006)
Study on a New Mining Association Rule Without Candidate Generation~4/―Relim AlgorithmComputing Technology and Automation
F. Scarselli, M. Gori, A. Tsoi, M. Hagenbuchner, G. Monfardini (2009)
The Graph Neural Network ModelIEEE Transactions on Neural Networks, 20
Keyulu Xu, Weihua Hu, J. Leskovec, S. Jegelka (2018)
How Powerful are Graph Neural Networks?ArXiv, abs/1810.00826
Jin-zhou Feng, Yu Wang, Jin Peng, M. Sun, J. Zeng, Hua Jiang (2019)
Comparison between logistic regression and machine learning algorithms on survival prediction of traumatic brain injuries.Journal of critical care, 54
(2015)
Research on Bayesian skewed link models in credit scoring
Wei Ma, Jun Lu (2017)
An Equivalence of Fully Connected Layer and Convolutional LayerArXiv, abs/1712.01252
(2014)
Research and empirical analysis of personal credit evaluation model based on random Forest
M. Ester, H. Kriegel, J. Sander, Xiaowei Xu (1996)
A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise
(2020)
Personal credit evaluation based on improved GS-XGBoost
(2020)
Exploration of new intelligent group control and management system platform
(2016)
Analysis of individual credit scoring based on logistic regression with the adaptive Lasso
Computer Engineering and Applications
Dejie Yang, Ning Zhang, Ji Yuan, Lu Bai (2019)
基于堆栈降噪自编码网络的个人信用风险评估方法 (Individual Credit Risk Assessment Based on Stacked Denoising Autoencoder Networks)计算机科学, 46
(2004)
The application of k-nearest neighbor discriminant analysis method in personal credit assessment
Modern Management Science
(2020)
Personal credit risk assessment method for high- dimensional data
Xinhui Zhang, Xun Shen, Tinghui Ouyang (2022)
Extension of DBSCAN in Online Clustering: An Approach Based on Three-Layer Granular ModelsApplied Sciences
(2002)
Classification and regression by random Forest
Internet marketing underground industry users refer to people who use technology means to simulate a large number of real consumer behaviors to obtain marketing activities rewards illegally, which leads to increased cost of enterprises and reduced effect of marketing. Therefore, this paper aims to construct a user risk assessment model to identify potential underground industry users to protect the interests of real consumers and reduce the marketing costs of enterprises.Design/methodology/approachMethod feature extraction is based on two aspects. The first aspect is based on traditional statistical characteristics, using density-based spatial clustering of applications with noise clustering method to obtain user-dense regions. According to the total number of users in the region, the corresponding risk level of the receiving address is assigned. So that high-quality address information can be extracted. The second aspect is based on the time period during which users participate in activities, using frequent item set mining to find multiple users with similar operations within the same time period. Extract the behavior flow chart according to the user participation, so that the model can mine the deep relationship between the participating behavior and the underground industry users.FindingsBased on the real underground industry user data set, the features of the data set are extracted by the proposed method. The features are experimentally verified by different models such as random forest, fully-connected layer network, SVM and XGBOST, and the proposed method is comprehensively evaluated. Experimental results show that in the best case, our method can improve the F1-score of traditional models by 55.37%.Originality/valueThis paper investigates the relative importance of static information and dynamic behavior characteristics of users in predicting underground industry users, and whether the absence of features of these categories affects the prediction results. This investigation can go a long way in aiding further research on this subject and found the features which improved the accuracy of predicting underground industry users.
International Journal of Web Information Systems – Emerald Publishing
Published: Jul 12, 2023
Keywords: User risk assessment; Time series flow diagram; Graph neural network; Feature engineering
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.