SlideShare ist ein Scribd-Unternehmen logo
1 von 59
Downloaden Sie, um offline zu lesen
Big Data and AI in P2P
Industry
Wenzhe Li
nadalwz1115@gmail.com
Feb 1, 2016
Puhui Finance (www.puhuifinance.com)
Services
爱钱
进
普惠
信贷
创新
资产
普惠
财富
• Internet Financing P2P
company, headquarters
in Beijing
• Founded in July 2013
• $50M series A funding in
Dec 2014
• ~5500 employees, 100+
offline stores
Offline Financing
Service
Online Financing
Service
Online Lending
Service
Offline Lending
Service
Puhui Finance (cont.)
Fastest growing p2p
company. Big data
technology is the key
In this talk, I will mainly focus on the
techniques used in lending side risk control.
Similar techniques can be applied to the
financing side.
What the talk is about
Outline
• Why need Big data and AI
• Intro to FC Engine and Knowledge Graph
• Case 1: Anti-Fraud
• Case 2: Lost Contact Recovery
• Case 3: Detect Bad People via Search
• More use cases
• Challenges
• Credit system is not mature in China
• Targeting at under-served market, those who don’t have
enough credit to borrow from bank
• The data solely from credit history is not enough to build the
scoring models
• More efficient application reviewing process is needed as we
move more transactions from offline to online
Why big data & AI
Outline
• Why need Big data and AI
• Intro to FC Engine and Knowledge Graph
• Case 1: Anti-Fraud
• Case 2: Lost Contact Recovery
• Case 3: Detect Bad People via Search
• More use cases
• Challenges
The central problem is
risk control
The solution is to
use big data
Measure the risk for a person
Individual
Feature
Analysis
Relation
Analysis
?
Knowledge Graph
Feature Compute(FC)
Engine
• User explicitly input data (i.e. application form)
• Authorized* user data
• Mobile History
• Purchasing History
• ……
• Open Search
• Baidu.com
• 360.com
• Others (i.e. craigslist)
• 3rd- party data (i.e. blacklist)
Data
Unstructured Data
* User authorizes us to use their data
Feature Compute Engine
The goal is to convert unstructured
data to structured features
Feature Compute Engine
Credit Card
Mobile History
Purchasing
......
Precision Marketing
Fraud Score
Risk Score
FeatureCompute
Engine
Feature Container
(tens of thousands)
Data
....
....
Data
Credit Card
History
Mobile
History
Purchasing
History
Feature Compute
Engine
Data
Scoring Model
Purchasing
History
i.e. Purchasing History
Total amount spent during the last 6 months
User level (i.e. Prime, Normal…)
Total number of transactions during the last 6 months
The length of time he/she uses the account
Total number of transactions related to virtual products
Total number of transactions related to luxury products
………
Few thousand
features
• It is a semantic network
• Based on graph data structure, consists
of points and edges. Point represents
entity, edge represents relationship.
• Knowledge graph connects
heterogeneous information. It provides
the ability to analyze the data from the
perspective of relationship.
What is knowledge graph
Some knowledge graphs
Knowledge graph – search engine
Knowledge graph – search engine
Knowledge graph – recommendation [1]
Storing Knowledge graph
Ranking DBMS
21 Neo4j (Graph
Database)
32 MarkLogic (XML)
42 Titan (Graph Database)
46 OrientDB (Graph
Database)
61 Virtuoso (RDF)
80 Jena (RDF)
88 Sesmae (RDF)
90 ArangoDB
(GraphDatabase)
120 AllegroGraph (RDF)
Trends for different types of database [2] Graph/RDF database ranking [3]
• Logic-based approach
• Probabilistic approach (i.e. distributed representation)
• Hybrid approach
Key techniques for knowledge graph
Link Prediction
Simple Approach: Pre-define some rules
i.e. (Peter FatherOf Tom) -> (Tom SonOf Peter)
(Peter ColleagueOf Tom), (Sarah ColleagueOf Peter)
-> (Peter ColleaugeOf Sarah)
Logic-based approach
Methods based on distributed representation
• Translating Embedding [4]
• Tensor Factorization (RESCAL) Hybrid approach [5]
• Neural Tensor Network (NTN) [6]
Hybrid Approach – Logic + Probabilistic
Simple Approach:
1. Generating all the new links using pre-define rules
2. Apply Statistical Learning
Advanced Approach (i.e.):
• Incorporation of Rules into Embeddings [7]
• Injecting Logical Background [8]
Use Cases
Connects person, phone, address, email, company……
Domain-specific knowledge graph
 10 types of entities
 ~50 types of relations
 ~50M entities
 0.2B relations
We expect that it will become ~20 times bigger by the end of this year due to
the business growth
Domain-specific knowledge graph
Outline
• Why need Big data and AI
• Intro to FC Engine and Knowledge Graph
• Case 1: Anti-Fraud
• Case 2: Lost Contact Recovery
• Case 3: Detect Bad People via Search
• More use cases
• Challenges
Applicant shares the
same personal phone
with other applicant
Phone
Applicant
Other
applicant
Personal Phone Personal Phone
Antifraud - rules
Applicant and other
applicant share the
same colleague phone,
but with different
company names
Phone
Applicant
Other
applicant
Colleague phone
Company 1 Company 2
Colleague phone
Antifraud – rules (cont.)
Phone
Applicant
Personal phone
Phone
Phone
Phone
Phone
Phone
Overdue
Overdue
Some of the
applicant’s contacts
didn’t pay back the
loan on time
Antifraud – rules (cont.)
Person 2
Person 1
Triangle relationship
Person 3
Antifraud – cycle detection
Applicant Applicant 2
Parent of Parent of
Applicant 1
Spouse
Inconsistent relations
Antifraud – inconsistent relationship
Antifraud – suspicious group
Person 2
Person 1
Person 3
Share a lot of
common attributes
Knowledge Graph
Visualization • Visualize entities and
relationships
• Design anti-fraud rules
via observational study
Antifraud – design by observation
Rapid change of
relationship structure
within short time period
Antifraud – evolution of graph structure
LR
Decision Tree
Random Forest
SVM
ANN
Models Prediction
Extracted
Features from
Raw Data
Results from
anti-fraud
rules
User direct
attributes
Variables
DNN
Score is used to
directly reject or
accept the loan
Antifraud – fraud score
score
Outline
• Why need Big data and AI
• Intro to FC Engine and Knowledge Graph
• Case 1: Anti-Fraud
• Case 2: Lost Contact Recovery
• Case 3: Detect Bad People via Search
• More use cases
• Challenges
The borrowers disappear, all the contact information they
explicitly provided become invalid. How to reach them?
Lost contact recovery – what is it
Implicitly infer potential contact information
Phone
Applicant
Personal phone
Phone
Phone
Phone
Phone
Phone
Rank the phone numbers,
and predict relationship
Building phone network – 1st order extension
Building phone network – 2nd order extension
Phone
Applicant
Personal phone
Phone
Phone
Phone
Phone
Phone
Phone
Phone
Phone
Phone
Phone
Rank the phone
numbers, and
predict relationship
3rd order ..
Phone
Applicant
Personal phone
Phone
Phone
Phone
Phone
Phone
Phone
Phone
Phone
Phone
Phone
Phone
Phone
Simple Ranking Criteria
• The total length of time
• The frequency of calls
Advanced Approach
• Learning the ranking score using machine learning approach
Building phone network – Rank
• Total # of times of calling
• Total length of time of
calling
• Total # of times of being
called
• Total # of times of calling
• Average time per call
• Maximum length of time
• # of times of calling
between 0-4am
• # of times of calling
between 4-8am
• ……
Building phone network – Predict the relation
LR
Decision Tree
Random Forest
SVM
ANN
Models
Prediction of relation
~100 Features
DNN
Relation
With very limited
training data, our
model provides
~30% accuracy
Person
Applicant
Personal phone
Person
Other
applicant
knows?
Other approach – Link prediction (on-going work)
Link Prediction
Outline
• Why need Big data and AI
• Intro to FC Engine and Knowledge Graph
• Case 1: Anti-Fraud
• Case 2: Lost Contact Recovery
• Case 3: Detect Bad People via Search
• More use cases
• Challenges
Detect Bad People via Search
From the search results, we label each
entities in the knowledge graph i.e. black,
green etc.
• Baidu.com
• 360.com
• other public
websites
Search for basic information….
• Phone number
• Email
• QQ
• Other IDs
Search Fields Search Engines & Public Site
Search for phone number…
Search for Email…
Fraud
• Clustering analysis
• Precision marketing
• ……
Other Applications we are working on
Outline
• Why need Big data and AI
• Intro to FC Engine and Knowledge Graph
• Case 1: Anti-Fraud
• Case 2: Lost Contact Recovery
• Case 3: Detect Bad People via Search
• More use cases
• Challenges
Challenges : Unstructured Data
Unstructured
Data
Images
Text
AudioVideo
Machine Learning
Natural Language
Processing
Data Mining
Challenges : Name Disambiguation
Applicant
Other
applicant
Puhui
Finance
Ltd.
Puhui
Finance
Same company, can
we merge?
It is a very important
problem to deal with!
Challenges : Reasoning
However, It is still an open problem
• Logic-based approach
• Probabilistic approach (i.e. distributed representation)
• Hybrid approach
Link Prediction
Challenges : Insufficient Samples
Big data, but small samples
• Senior/Lead Machine Learning/NLP Engineers
• Senior/Lead Data Engineer/Scientist
• Senior/Lead Architect
• Senior/Lead Software Engineer
liwenzhe@puhuifinance.com
zhaopin@puhuifinance.com
We are hiring! (in Beijing)
Open positions, but not limited to….
Contact
Company Website
www.puhuifinance.com
Email:
nadalwz1115@hotmail.com
nadalwz1115@gmail.com
Wechat(微信):
liwenzhe595675
Thanks!
[1] http://www.datapop.com/
[2] http://db-engines.com/en/blog_post//43
[3] http://db-engines.com/en/ranking
[4] Bordes, Antoine, et al. "Translating Embeddings for Modeling Multi-
relational Data." Advances in Neural Information Processing
Systems(2013):2787-2795.
[5] Nickel, Maximilian, V. Tresp, and H. P. Kriegel. "A Three-Way Model
for Collective Learning on Multi-Relational Data.." International
Conference on Machine Learning 2011:809-816.
References
[6] Richard Socher, Danqi Chen, Christopher D. Manning, Andrew Ng.
Reasoning With Neural Tensor Networks for Knowledge Base
Completion. Advances in Neural Information Processing Systems(2013)
[7] Wang, Quan, Wang, Bin, and Guo, Li. "Knowledge base completion
using embeddings and rules." Proceedings of the 24th International
Conference on Artificial Intelligence AAAI Press, 2015.
[8] T Rocktäschel,S Singh,S Riedel. Injecting Logical Background
Knowledge into Embeddings for Relation Extraction
http://talks.cam.ac.uk/talk/index/58360
References

Weitere ähnliche Inhalte

Was ist angesagt?

Neo4j graphs in the real world - graph days d.c. - april 14, 2015
Neo4j   graphs in the real world - graph days d.c. - april 14, 2015Neo4j   graphs in the real world - graph days d.c. - april 14, 2015
Neo4j graphs in the real world - graph days d.c. - april 14, 2015Neo4j
 
Introduction to graph databases GraphDays
Introduction to graph databases  GraphDaysIntroduction to graph databases  GraphDays
Introduction to graph databases GraphDaysNeo4j
 
Intro to Neo4j Webinar
Intro to Neo4j WebinarIntro to Neo4j Webinar
Intro to Neo4j WebinarNeo4j
 
NoSQL Graph Databases - Why, When and Where
NoSQL Graph Databases - Why, When and WhereNoSQL Graph Databases - Why, When and Where
NoSQL Graph Databases - Why, When and WhereEugene Hanikblum
 
Introduction to Graph databases and Neo4j (by Stefan Armbruster)
Introduction to Graph databases and Neo4j (by Stefan Armbruster)Introduction to Graph databases and Neo4j (by Stefan Armbruster)
Introduction to Graph databases and Neo4j (by Stefan Armbruster)barcelonajug
 
Neo4j the Anti Crime Database
Neo4j the Anti Crime DatabaseNeo4j the Anti Crime Database
Neo4j the Anti Crime DatabaseNeo4j
 
Intro to Graphs and Neo4j
Intro to Graphs and Neo4jIntro to Graphs and Neo4j
Intro to Graphs and Neo4jjexp
 
Family tree of data – provenance and neo4j
Family tree of data – provenance and neo4jFamily tree of data – provenance and neo4j
Family tree of data – provenance and neo4jM. David Allen
 
RDBMS to Graphs
RDBMS to GraphsRDBMS to Graphs
RDBMS to GraphsNeo4j
 
Democratizing Data at Airbnb
Democratizing Data at AirbnbDemocratizing Data at Airbnb
Democratizing Data at AirbnbNeo4j
 
Introducing Neo4j
Introducing Neo4jIntroducing Neo4j
Introducing Neo4jNeo4j
 
An Introduction to NOSQL, Graph Databases and Neo4j
An Introduction to NOSQL, Graph Databases and Neo4jAn Introduction to NOSQL, Graph Databases and Neo4j
An Introduction to NOSQL, Graph Databases and Neo4jDebanjan Mahata
 
Intro to Neo4j and Graph Databases
Intro to Neo4j and Graph DatabasesIntro to Neo4j and Graph Databases
Intro to Neo4j and Graph DatabasesNeo4j
 
GraphTalks - Einführung in Graphdatenbanken
GraphTalks - Einführung in GraphdatenbankenGraphTalks - Einführung in Graphdatenbanken
GraphTalks - Einführung in GraphdatenbankenNeo4j
 
Neo4J : Introduction to Graph Database
Neo4J : Introduction to Graph DatabaseNeo4J : Introduction to Graph Database
Neo4J : Introduction to Graph DatabaseMindfire Solutions
 
Graphdatenbank Neo4j: Konzept, Positionierung, Status Region DACH - Bruno Un...
 Graphdatenbank Neo4j: Konzept, Positionierung, Status Region DACH - Bruno Un... Graphdatenbank Neo4j: Konzept, Positionierung, Status Region DACH - Bruno Un...
Graphdatenbank Neo4j: Konzept, Positionierung, Status Region DACH - Bruno Un...Neo4j
 
Relational to Big Graph
Relational to Big GraphRelational to Big Graph
Relational to Big GraphNeo4j
 
TehranDB Meet-up April 2018 Introduction to Graph Database
TehranDB Meet-up April 2018 Introduction to Graph DatabaseTehranDB Meet-up April 2018 Introduction to Graph Database
TehranDB Meet-up April 2018 Introduction to Graph DatabaseHamoon Mohammadian Pour
 

Was ist angesagt? (20)

Neo4j graphs in the real world - graph days d.c. - april 14, 2015
Neo4j   graphs in the real world - graph days d.c. - april 14, 2015Neo4j   graphs in the real world - graph days d.c. - april 14, 2015
Neo4j graphs in the real world - graph days d.c. - april 14, 2015
 
Graph based data models
Graph based data modelsGraph based data models
Graph based data models
 
Introduction to graph databases GraphDays
Introduction to graph databases  GraphDaysIntroduction to graph databases  GraphDays
Introduction to graph databases GraphDays
 
Intro to Neo4j Webinar
Intro to Neo4j WebinarIntro to Neo4j Webinar
Intro to Neo4j Webinar
 
NoSQL Graph Databases - Why, When and Where
NoSQL Graph Databases - Why, When and WhereNoSQL Graph Databases - Why, When and Where
NoSQL Graph Databases - Why, When and Where
 
Introduction to Graph databases and Neo4j (by Stefan Armbruster)
Introduction to Graph databases and Neo4j (by Stefan Armbruster)Introduction to Graph databases and Neo4j (by Stefan Armbruster)
Introduction to Graph databases and Neo4j (by Stefan Armbruster)
 
Neo4j the Anti Crime Database
Neo4j the Anti Crime DatabaseNeo4j the Anti Crime Database
Neo4j the Anti Crime Database
 
Graph db
Graph dbGraph db
Graph db
 
Intro to Graphs and Neo4j
Intro to Graphs and Neo4jIntro to Graphs and Neo4j
Intro to Graphs and Neo4j
 
Family tree of data – provenance and neo4j
Family tree of data – provenance and neo4jFamily tree of data – provenance and neo4j
Family tree of data – provenance and neo4j
 
RDBMS to Graphs
RDBMS to GraphsRDBMS to Graphs
RDBMS to Graphs
 
Democratizing Data at Airbnb
Democratizing Data at AirbnbDemocratizing Data at Airbnb
Democratizing Data at Airbnb
 
Introducing Neo4j
Introducing Neo4jIntroducing Neo4j
Introducing Neo4j
 
An Introduction to NOSQL, Graph Databases and Neo4j
An Introduction to NOSQL, Graph Databases and Neo4jAn Introduction to NOSQL, Graph Databases and Neo4j
An Introduction to NOSQL, Graph Databases and Neo4j
 
Intro to Neo4j and Graph Databases
Intro to Neo4j and Graph DatabasesIntro to Neo4j and Graph Databases
Intro to Neo4j and Graph Databases
 
GraphTalks - Einführung in Graphdatenbanken
GraphTalks - Einführung in GraphdatenbankenGraphTalks - Einführung in Graphdatenbanken
GraphTalks - Einführung in Graphdatenbanken
 
Neo4J : Introduction to Graph Database
Neo4J : Introduction to Graph DatabaseNeo4J : Introduction to Graph Database
Neo4J : Introduction to Graph Database
 
Graphdatenbank Neo4j: Konzept, Positionierung, Status Region DACH - Bruno Un...
 Graphdatenbank Neo4j: Konzept, Positionierung, Status Region DACH - Bruno Un... Graphdatenbank Neo4j: Konzept, Positionierung, Status Region DACH - Bruno Un...
Graphdatenbank Neo4j: Konzept, Positionierung, Status Region DACH - Bruno Un...
 
Relational to Big Graph
Relational to Big GraphRelational to Big Graph
Relational to Big Graph
 
TehranDB Meet-up April 2018 Introduction to Graph Database
TehranDB Meet-up April 2018 Introduction to Graph DatabaseTehranDB Meet-up April 2018 Introduction to Graph Database
TehranDB Meet-up April 2018 Introduction to Graph Database
 

Andere mochten auch

Research project presentation for Managing Global Sourcing
Research project presentation for Managing Global SourcingResearch project presentation for Managing Global Sourcing
Research project presentation for Managing Global Sourcingnipunhanda
 
The Impact of Machine Learning on Digital Commerce
The Impact of Machine Learning on Digital CommerceThe Impact of Machine Learning on Digital Commerce
The Impact of Machine Learning on Digital CommerceAllan MacGregor
 
Sensing WiFi Network for Personal IoT Analytics
Sensing WiFi Network for Personal IoT Analytics Sensing WiFi Network for Personal IoT Analytics
Sensing WiFi Network for Personal IoT Analytics Fahim Kawsar
 
Stephen Hilton - ND2012 Day 1, Plenary 2: Super-connected Cities
Stephen Hilton - ND2012 Day 1, Plenary 2: Super-connected CitiesStephen Hilton - ND2012 Day 1, Plenary 2: Super-connected Cities
Stephen Hilton - ND2012 Day 1, Plenary 2: Super-connected CitiesGoONND2012
 
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsDiscovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsNexgen Technology
 
12.07.2012 T8 Connected Cities, Daniela Krautsack (Cows in Jackets) & Joanna ...
12.07.2012 T8 Connected Cities, Daniela Krautsack (Cows in Jackets) & Joanna ...12.07.2012 T8 Connected Cities, Daniela Krautsack (Cows in Jackets) & Joanna ...
12.07.2012 T8 Connected Cities, Daniela Krautsack (Cows in Jackets) & Joanna ...Werbeplanung.at Summit
 
"Blockchains for AI", Trent McConaghy, AI researcher, blockchain engineer. Fo...
"Blockchains for AI", Trent McConaghy, AI researcher, blockchain engineer. Fo..."Blockchains for AI", Trent McConaghy, AI researcher, blockchain engineer. Fo...
"Blockchains for AI", Trent McConaghy, AI researcher, blockchain engineer. Fo...Dataconomy Media
 
Oliver Scheer, Technical Evangelist at Microsoft, "SQL Azure, Power BI (embed...
Oliver Scheer, Technical Evangelist at Microsoft, "SQL Azure, Power BI (embed...Oliver Scheer, Technical Evangelist at Microsoft, "SQL Azure, Power BI (embed...
Oliver Scheer, Technical Evangelist at Microsoft, "SQL Azure, Power BI (embed...Dataconomy Media
 
Smart Connected Cities Cisco Vision & Perspective by Ravinder Pal Singh
Smart Connected Cities Cisco Vision & Perspective by Ravinder Pal SinghSmart Connected Cities Cisco Vision & Perspective by Ravinder Pal Singh
Smart Connected Cities Cisco Vision & Perspective by Ravinder Pal SinghIPPAI
 
PERFORMIX.Wien 2016 – Search ohnne Keywords – Viktor Zemann (traffic3)
PERFORMIX.Wien 2016 – Search ohnne Keywords – Viktor Zemann (traffic3)PERFORMIX.Wien 2016 – Search ohnne Keywords – Viktor Zemann (traffic3)
PERFORMIX.Wien 2016 – Search ohnne Keywords – Viktor Zemann (traffic3)Werbeplanung.at Summit
 
Smart Cities UK 2016
Smart Cities UK 2016Smart Cities UK 2016
Smart Cities UK 20164 All of Us
 
Hacking health: IoT, analytics and other trends
Hacking health: IoT, analytics and other trendsHacking health: IoT, analytics and other trends
Hacking health: IoT, analytics and other trendsJim Boland
 
Sören Eickhoff, Informatica GmbH, "Informatica Intelligent Data Lake – Self S...
Sören Eickhoff, Informatica GmbH, "Informatica Intelligent Data Lake – Self S...Sören Eickhoff, Informatica GmbH, "Informatica Intelligent Data Lake – Self S...
Sören Eickhoff, Informatica GmbH, "Informatica Intelligent Data Lake – Self S...Dataconomy Media
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in IndiaYogesh Lolge
 

Andere mochten auch (20)

Big data
Big dataBig data
Big data
 
AppStore SEO
AppStore SEOAppStore SEO
AppStore SEO
 
Iain Bennett DCMS - 13 04 30 ultra connected cities seminar
Iain Bennett DCMS - 13 04 30 ultra connected cities seminarIain Bennett DCMS - 13 04 30 ultra connected cities seminar
Iain Bennett DCMS - 13 04 30 ultra connected cities seminar
 
Rob Hamlin - CityFibre Holdings inca ultra connected cities - gigabit cities ...
Rob Hamlin - CityFibre Holdings inca ultra connected cities - gigabit cities ...Rob Hamlin - CityFibre Holdings inca ultra connected cities - gigabit cities ...
Rob Hamlin - CityFibre Holdings inca ultra connected cities - gigabit cities ...
 
Research project presentation for Managing Global Sourcing
Research project presentation for Managing Global SourcingResearch project presentation for Managing Global Sourcing
Research project presentation for Managing Global Sourcing
 
The Impact of Machine Learning on Digital Commerce
The Impact of Machine Learning on Digital CommerceThe Impact of Machine Learning on Digital Commerce
The Impact of Machine Learning on Digital Commerce
 
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps
 
Sensing WiFi Network for Personal IoT Analytics
Sensing WiFi Network for Personal IoT Analytics Sensing WiFi Network for Personal IoT Analytics
Sensing WiFi Network for Personal IoT Analytics
 
Stephen Hilton - ND2012 Day 1, Plenary 2: Super-connected Cities
Stephen Hilton - ND2012 Day 1, Plenary 2: Super-connected CitiesStephen Hilton - ND2012 Day 1, Plenary 2: Super-connected Cities
Stephen Hilton - ND2012 Day 1, Plenary 2: Super-connected Cities
 
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsDiscovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps
 
12.07.2012 T8 Connected Cities, Daniela Krautsack (Cows in Jackets) & Joanna ...
12.07.2012 T8 Connected Cities, Daniela Krautsack (Cows in Jackets) & Joanna ...12.07.2012 T8 Connected Cities, Daniela Krautsack (Cows in Jackets) & Joanna ...
12.07.2012 T8 Connected Cities, Daniela Krautsack (Cows in Jackets) & Joanna ...
 
"Blockchains for AI", Trent McConaghy, AI researcher, blockchain engineer. Fo...
"Blockchains for AI", Trent McConaghy, AI researcher, blockchain engineer. Fo..."Blockchains for AI", Trent McConaghy, AI researcher, blockchain engineer. Fo...
"Blockchains for AI", Trent McConaghy, AI researcher, blockchain engineer. Fo...
 
Oliver Scheer, Technical Evangelist at Microsoft, "SQL Azure, Power BI (embed...
Oliver Scheer, Technical Evangelist at Microsoft, "SQL Azure, Power BI (embed...Oliver Scheer, Technical Evangelist at Microsoft, "SQL Azure, Power BI (embed...
Oliver Scheer, Technical Evangelist at Microsoft, "SQL Azure, Power BI (embed...
 
Smart Connected Cities Cisco Vision & Perspective by Ravinder Pal Singh
Smart Connected Cities Cisco Vision & Perspective by Ravinder Pal SinghSmart Connected Cities Cisco Vision & Perspective by Ravinder Pal Singh
Smart Connected Cities Cisco Vision & Perspective by Ravinder Pal Singh
 
PERFORMIX.Wien 2016 – Search ohnne Keywords – Viktor Zemann (traffic3)
PERFORMIX.Wien 2016 – Search ohnne Keywords – Viktor Zemann (traffic3)PERFORMIX.Wien 2016 – Search ohnne Keywords – Viktor Zemann (traffic3)
PERFORMIX.Wien 2016 – Search ohnne Keywords – Viktor Zemann (traffic3)
 
Smart Cities UK 2016
Smart Cities UK 2016Smart Cities UK 2016
Smart Cities UK 2016
 
Connected Retail: Running the Store with IoT
Connected Retail: Running the Store with IoTConnected Retail: Running the Store with IoT
Connected Retail: Running the Store with IoT
 
Hacking health: IoT, analytics and other trends
Hacking health: IoT, analytics and other trendsHacking health: IoT, analytics and other trends
Hacking health: IoT, analytics and other trends
 
Sören Eickhoff, Informatica GmbH, "Informatica Intelligent Data Lake – Self S...
Sören Eickhoff, Informatica GmbH, "Informatica Intelligent Data Lake – Self S...Sören Eickhoff, Informatica GmbH, "Informatica Intelligent Data Lake – Self S...
Sören Eickhoff, Informatica GmbH, "Informatica Intelligent Data Lake – Self S...
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
 

Ähnlich wie Bigdata and ai in p2 p industry: Knowledge graph and inference

Usama Fayyad talk in South Africa: From BigData to Data Science
Usama Fayyad talk in South Africa:  From BigData to Data ScienceUsama Fayyad talk in South Africa:  From BigData to Data Science
Usama Fayyad talk in South Africa: From BigData to Data ScienceUsama Fayyad
 
4 Ways AI Can Help Your Small Business
4 Ways AI Can Help Your Small Business4 Ways AI Can Help Your Small Business
4 Ways AI Can Help Your Small BusinessKeita Broadwater
 
apidays LIVE Hong Kong 2021 - Federated Learning for Banking by Isaac Wong, W...
apidays LIVE Hong Kong 2021 - Federated Learning for Banking by Isaac Wong, W...apidays LIVE Hong Kong 2021 - Federated Learning for Banking by Isaac Wong, W...
apidays LIVE Hong Kong 2021 - Federated Learning for Banking by Isaac Wong, W...apidays
 
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"Vivastream
 
Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"
Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"
Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"Vivastream
 
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"Vivastream
 
Pasoco ITSMF,SPMI-PDPA-140626-public
Pasoco ITSMF,SPMI-PDPA-140626-publicPasoco ITSMF,SPMI-PDPA-140626-public
Pasoco ITSMF,SPMI-PDPA-140626-publicPasocoPteLtd
 
SiriusDecisions Explores the Need for Demand Orchestration
SiriusDecisions Explores the Need for Demand OrchestrationSiriusDecisions Explores the Need for Demand Orchestration
SiriusDecisions Explores the Need for Demand OrchestrationIntegrate
 
Big Data, Big Investment
Big Data, Big InvestmentBig Data, Big Investment
Big Data, Big InvestmentGGV Capital
 
AI Foundations Course Module 1 - An AI Transformation Journey
AI Foundations Course Module 1 - An AI Transformation JourneyAI Foundations Course Module 1 - An AI Transformation Journey
AI Foundations Course Module 1 - An AI Transformation JourneySri Ambati
 
Minne analytics presentation 2018 12 03 final compressed
Minne analytics presentation 2018 12 03 final   compressedMinne analytics presentation 2018 12 03 final   compressed
Minne analytics presentation 2018 12 03 final compressedBonnie Holub
 
Slides of “Into the Deep Web: Understanding E-commerce Fraud from Autonomous ...
Slides of “Into the Deep Web: Understanding E-commerce Fraud from Autonomous ...Slides of “Into the Deep Web: Understanding E-commerce Fraud from Autonomous ...
Slides of “Into the Deep Web: Understanding E-commerce Fraud from Autonomous ...PierantonioAzzalini
 
Use of Advanced Technology in Procurement
Use of Advanced Technology in ProcurementUse of Advanced Technology in Procurement
Use of Advanced Technology in ProcurementDr Mark Lovatt
 
Digital Experiences Using a Conversational Interface
Digital Experiences Using a Conversational InterfaceDigital Experiences Using a Conversational Interface
Digital Experiences Using a Conversational InterfaceBala Iyer
 
Machine Learning Adoption: Crossing the chasm for banking and insurance sector
Machine Learning Adoption: Crossing the chasm for banking and insurance sectorMachine Learning Adoption: Crossing the chasm for banking and insurance sector
Machine Learning Adoption: Crossing the chasm for banking and insurance sectorRudradeb Mitra
 
Digital Marketing Analytics Certification - Session One
Digital Marketing Analytics Certification - Session OneDigital Marketing Analytics Certification - Session One
Digital Marketing Analytics Certification - Session OneBrand Digital, Inc
 
Building Open Data Markets Using Sensing as a Service Model
Building Open Data Markets Using Sensing as a Service ModelBuilding Open Data Markets Using Sensing as a Service Model
Building Open Data Markets Using Sensing as a Service ModelCharith Perera
 
Trust in the age of blockchain
Trust in the age of blockchainTrust in the age of blockchain
Trust in the age of blockchainMicheleNati
 
Minne analytics presentation 2018 12 03 final compressed
Minne analytics presentation 2018 12 03 final   compressedMinne analytics presentation 2018 12 03 final   compressed
Minne analytics presentation 2018 12 03 final compressedBonnie Holub
 

Ähnlich wie Bigdata and ai in p2 p industry: Knowledge graph and inference (20)

Big Data in FinTech
Big Data in FinTechBig Data in FinTech
Big Data in FinTech
 
Usama Fayyad talk in South Africa: From BigData to Data Science
Usama Fayyad talk in South Africa:  From BigData to Data ScienceUsama Fayyad talk in South Africa:  From BigData to Data Science
Usama Fayyad talk in South Africa: From BigData to Data Science
 
4 Ways AI Can Help Your Small Business
4 Ways AI Can Help Your Small Business4 Ways AI Can Help Your Small Business
4 Ways AI Can Help Your Small Business
 
apidays LIVE Hong Kong 2021 - Federated Learning for Banking by Isaac Wong, W...
apidays LIVE Hong Kong 2021 - Federated Learning for Banking by Isaac Wong, W...apidays LIVE Hong Kong 2021 - Federated Learning for Banking by Isaac Wong, W...
apidays LIVE Hong Kong 2021 - Federated Learning for Banking by Isaac Wong, W...
 
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
 
Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"
Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"
Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"
 
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
 
Pasoco ITSMF,SPMI-PDPA-140626-public
Pasoco ITSMF,SPMI-PDPA-140626-publicPasoco ITSMF,SPMI-PDPA-140626-public
Pasoco ITSMF,SPMI-PDPA-140626-public
 
SiriusDecisions Explores the Need for Demand Orchestration
SiriusDecisions Explores the Need for Demand OrchestrationSiriusDecisions Explores the Need for Demand Orchestration
SiriusDecisions Explores the Need for Demand Orchestration
 
Big Data, Big Investment
Big Data, Big InvestmentBig Data, Big Investment
Big Data, Big Investment
 
AI Foundations Course Module 1 - An AI Transformation Journey
AI Foundations Course Module 1 - An AI Transformation JourneyAI Foundations Course Module 1 - An AI Transformation Journey
AI Foundations Course Module 1 - An AI Transformation Journey
 
Minne analytics presentation 2018 12 03 final compressed
Minne analytics presentation 2018 12 03 final   compressedMinne analytics presentation 2018 12 03 final   compressed
Minne analytics presentation 2018 12 03 final compressed
 
Slides of “Into the Deep Web: Understanding E-commerce Fraud from Autonomous ...
Slides of “Into the Deep Web: Understanding E-commerce Fraud from Autonomous ...Slides of “Into the Deep Web: Understanding E-commerce Fraud from Autonomous ...
Slides of “Into the Deep Web: Understanding E-commerce Fraud from Autonomous ...
 
Use of Advanced Technology in Procurement
Use of Advanced Technology in ProcurementUse of Advanced Technology in Procurement
Use of Advanced Technology in Procurement
 
Digital Experiences Using a Conversational Interface
Digital Experiences Using a Conversational InterfaceDigital Experiences Using a Conversational Interface
Digital Experiences Using a Conversational Interface
 
Machine Learning Adoption: Crossing the chasm for banking and insurance sector
Machine Learning Adoption: Crossing the chasm for banking and insurance sectorMachine Learning Adoption: Crossing the chasm for banking and insurance sector
Machine Learning Adoption: Crossing the chasm for banking and insurance sector
 
Digital Marketing Analytics Certification - Session One
Digital Marketing Analytics Certification - Session OneDigital Marketing Analytics Certification - Session One
Digital Marketing Analytics Certification - Session One
 
Building Open Data Markets Using Sensing as a Service Model
Building Open Data Markets Using Sensing as a Service ModelBuilding Open Data Markets Using Sensing as a Service Model
Building Open Data Markets Using Sensing as a Service Model
 
Trust in the age of blockchain
Trust in the age of blockchainTrust in the age of blockchain
Trust in the age of blockchain
 
Minne analytics presentation 2018 12 03 final compressed
Minne analytics presentation 2018 12 03 final   compressedMinne analytics presentation 2018 12 03 final   compressed
Minne analytics presentation 2018 12 03 final compressed
 

Kürzlich hochgeladen

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Kürzlich hochgeladen (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Bigdata and ai in p2 p industry: Knowledge graph and inference

  • 1. Big Data and AI in P2P Industry Wenzhe Li nadalwz1115@gmail.com Feb 1, 2016
  • 2. Puhui Finance (www.puhuifinance.com) Services 爱钱 进 普惠 信贷 创新 资产 普惠 财富 • Internet Financing P2P company, headquarters in Beijing • Founded in July 2013 • $50M series A funding in Dec 2014 • ~5500 employees, 100+ offline stores Offline Financing Service Online Financing Service Online Lending Service Offline Lending Service
  • 3. Puhui Finance (cont.) Fastest growing p2p company. Big data technology is the key
  • 4. In this talk, I will mainly focus on the techniques used in lending side risk control. Similar techniques can be applied to the financing side. What the talk is about
  • 5. Outline • Why need Big data and AI • Intro to FC Engine and Knowledge Graph • Case 1: Anti-Fraud • Case 2: Lost Contact Recovery • Case 3: Detect Bad People via Search • More use cases • Challenges
  • 6. • Credit system is not mature in China • Targeting at under-served market, those who don’t have enough credit to borrow from bank • The data solely from credit history is not enough to build the scoring models • More efficient application reviewing process is needed as we move more transactions from offline to online Why big data & AI
  • 7. Outline • Why need Big data and AI • Intro to FC Engine and Knowledge Graph • Case 1: Anti-Fraud • Case 2: Lost Contact Recovery • Case 3: Detect Bad People via Search • More use cases • Challenges
  • 8. The central problem is risk control The solution is to use big data
  • 9. Measure the risk for a person Individual Feature Analysis Relation Analysis ? Knowledge Graph Feature Compute(FC) Engine
  • 10. • User explicitly input data (i.e. application form) • Authorized* user data • Mobile History • Purchasing History • …… • Open Search • Baidu.com • 360.com • Others (i.e. craigslist) • 3rd- party data (i.e. blacklist) Data Unstructured Data * User authorizes us to use their data
  • 11. Feature Compute Engine The goal is to convert unstructured data to structured features
  • 12. Feature Compute Engine Credit Card Mobile History Purchasing ...... Precision Marketing Fraud Score Risk Score FeatureCompute Engine Feature Container (tens of thousands) Data .... .... Data Credit Card History Mobile History Purchasing History Feature Compute Engine Data Scoring Model
  • 13. Purchasing History i.e. Purchasing History Total amount spent during the last 6 months User level (i.e. Prime, Normal…) Total number of transactions during the last 6 months The length of time he/she uses the account Total number of transactions related to virtual products Total number of transactions related to luxury products ……… Few thousand features
  • 14. • It is a semantic network • Based on graph data structure, consists of points and edges. Point represents entity, edge represents relationship. • Knowledge graph connects heterogeneous information. It provides the ability to analyze the data from the perspective of relationship. What is knowledge graph
  • 16. Knowledge graph – search engine
  • 17. Knowledge graph – search engine
  • 18. Knowledge graph – recommendation [1]
  • 19. Storing Knowledge graph Ranking DBMS 21 Neo4j (Graph Database) 32 MarkLogic (XML) 42 Titan (Graph Database) 46 OrientDB (Graph Database) 61 Virtuoso (RDF) 80 Jena (RDF) 88 Sesmae (RDF) 90 ArangoDB (GraphDatabase) 120 AllegroGraph (RDF) Trends for different types of database [2] Graph/RDF database ranking [3]
  • 20. • Logic-based approach • Probabilistic approach (i.e. distributed representation) • Hybrid approach Key techniques for knowledge graph Link Prediction
  • 21. Simple Approach: Pre-define some rules i.e. (Peter FatherOf Tom) -> (Tom SonOf Peter) (Peter ColleagueOf Tom), (Sarah ColleagueOf Peter) -> (Peter ColleaugeOf Sarah) Logic-based approach
  • 22. Methods based on distributed representation • Translating Embedding [4] • Tensor Factorization (RESCAL) Hybrid approach [5] • Neural Tensor Network (NTN) [6]
  • 23. Hybrid Approach – Logic + Probabilistic Simple Approach: 1. Generating all the new links using pre-define rules 2. Apply Statistical Learning Advanced Approach (i.e.): • Incorporation of Rules into Embeddings [7] • Injecting Logical Background [8]
  • 25. Connects person, phone, address, email, company…… Domain-specific knowledge graph
  • 26.  10 types of entities  ~50 types of relations  ~50M entities  0.2B relations We expect that it will become ~20 times bigger by the end of this year due to the business growth Domain-specific knowledge graph
  • 27. Outline • Why need Big data and AI • Intro to FC Engine and Knowledge Graph • Case 1: Anti-Fraud • Case 2: Lost Contact Recovery • Case 3: Detect Bad People via Search • More use cases • Challenges
  • 28. Applicant shares the same personal phone with other applicant Phone Applicant Other applicant Personal Phone Personal Phone Antifraud - rules
  • 29. Applicant and other applicant share the same colleague phone, but with different company names Phone Applicant Other applicant Colleague phone Company 1 Company 2 Colleague phone Antifraud – rules (cont.)
  • 30. Phone Applicant Personal phone Phone Phone Phone Phone Phone Overdue Overdue Some of the applicant’s contacts didn’t pay back the loan on time Antifraud – rules (cont.)
  • 31. Person 2 Person 1 Triangle relationship Person 3 Antifraud – cycle detection
  • 32. Applicant Applicant 2 Parent of Parent of Applicant 1 Spouse Inconsistent relations Antifraud – inconsistent relationship
  • 33. Antifraud – suspicious group Person 2 Person 1 Person 3 Share a lot of common attributes
  • 34. Knowledge Graph Visualization • Visualize entities and relationships • Design anti-fraud rules via observational study Antifraud – design by observation
  • 35. Rapid change of relationship structure within short time period Antifraud – evolution of graph structure
  • 36. LR Decision Tree Random Forest SVM ANN Models Prediction Extracted Features from Raw Data Results from anti-fraud rules User direct attributes Variables DNN Score is used to directly reject or accept the loan Antifraud – fraud score score
  • 37. Outline • Why need Big data and AI • Intro to FC Engine and Knowledge Graph • Case 1: Anti-Fraud • Case 2: Lost Contact Recovery • Case 3: Detect Bad People via Search • More use cases • Challenges
  • 38. The borrowers disappear, all the contact information they explicitly provided become invalid. How to reach them? Lost contact recovery – what is it Implicitly infer potential contact information
  • 39. Phone Applicant Personal phone Phone Phone Phone Phone Phone Rank the phone numbers, and predict relationship Building phone network – 1st order extension
  • 40. Building phone network – 2nd order extension Phone Applicant Personal phone Phone Phone Phone Phone Phone Phone Phone Phone Phone Phone Rank the phone numbers, and predict relationship
  • 41. 3rd order .. Phone Applicant Personal phone Phone Phone Phone Phone Phone Phone Phone Phone Phone Phone Phone Phone
  • 42. Simple Ranking Criteria • The total length of time • The frequency of calls Advanced Approach • Learning the ranking score using machine learning approach Building phone network – Rank
  • 43. • Total # of times of calling • Total length of time of calling • Total # of times of being called • Total # of times of calling • Average time per call • Maximum length of time • # of times of calling between 0-4am • # of times of calling between 4-8am • …… Building phone network – Predict the relation LR Decision Tree Random Forest SVM ANN Models Prediction of relation ~100 Features DNN Relation With very limited training data, our model provides ~30% accuracy
  • 44. Person Applicant Personal phone Person Other applicant knows? Other approach – Link prediction (on-going work) Link Prediction
  • 45. Outline • Why need Big data and AI • Intro to FC Engine and Knowledge Graph • Case 1: Anti-Fraud • Case 2: Lost Contact Recovery • Case 3: Detect Bad People via Search • More use cases • Challenges
  • 46. Detect Bad People via Search From the search results, we label each entities in the knowledge graph i.e. black, green etc.
  • 47. • Baidu.com • 360.com • other public websites Search for basic information…. • Phone number • Email • QQ • Other IDs Search Fields Search Engines & Public Site
  • 48. Search for phone number…
  • 50. • Clustering analysis • Precision marketing • …… Other Applications we are working on
  • 51. Outline • Why need Big data and AI • Intro to FC Engine and Knowledge Graph • Case 1: Anti-Fraud • Case 2: Lost Contact Recovery • Case 3: Detect Bad People via Search • More use cases • Challenges
  • 52. Challenges : Unstructured Data Unstructured Data Images Text AudioVideo Machine Learning Natural Language Processing Data Mining
  • 53. Challenges : Name Disambiguation Applicant Other applicant Puhui Finance Ltd. Puhui Finance Same company, can we merge? It is a very important problem to deal with!
  • 54. Challenges : Reasoning However, It is still an open problem • Logic-based approach • Probabilistic approach (i.e. distributed representation) • Hybrid approach Link Prediction
  • 55. Challenges : Insufficient Samples Big data, but small samples
  • 56. • Senior/Lead Machine Learning/NLP Engineers • Senior/Lead Data Engineer/Scientist • Senior/Lead Architect • Senior/Lead Software Engineer liwenzhe@puhuifinance.com zhaopin@puhuifinance.com We are hiring! (in Beijing) Open positions, but not limited to…. Contact Company Website www.puhuifinance.com
  • 58. [1] http://www.datapop.com/ [2] http://db-engines.com/en/blog_post//43 [3] http://db-engines.com/en/ranking [4] Bordes, Antoine, et al. "Translating Embeddings for Modeling Multi- relational Data." Advances in Neural Information Processing Systems(2013):2787-2795. [5] Nickel, Maximilian, V. Tresp, and H. P. Kriegel. "A Three-Way Model for Collective Learning on Multi-Relational Data.." International Conference on Machine Learning 2011:809-816. References
  • 59. [6] Richard Socher, Danqi Chen, Christopher D. Manning, Andrew Ng. Reasoning With Neural Tensor Networks for Knowledge Base Completion. Advances in Neural Information Processing Systems(2013) [7] Wang, Quan, Wang, Bin, and Guo, Li. "Knowledge base completion using embeddings and rules." Proceedings of the 24th International Conference on Artificial Intelligence AAAI Press, 2015. [8] T Rocktäschel,S Singh,S Riedel. Injecting Logical Background Knowledge into Embeddings for Relation Extraction http://talks.cam.ac.uk/talk/index/58360 References