SlideShare a Scribd company logo
Big Data and AI in P2P
Industry
Wenzhe Li
nadalwz1115@gmail.com
Feb 1, 2016
Puhui Finance (www.puhuifinance.com)
Services
爱钱
进
普惠
信贷
创新
资产
普惠
财富
• Internet Financing P2P
company, headquarters
in Beijing
• Founded in July 2013
• $50M series A funding in
Dec 2014
• ~5500 employees, 100+
offline stores
Offline Financing
Service
Online Financing
Service
Online Lending
Service
Offline Lending
Service
Puhui Finance (cont.)
Fastest growing p2p
company. Big data
technology is the key
In this talk, I will mainly focus on the
techniques used in lending side risk control.
Similar techniques can be applied to the
financing side.
What the talk is about

Recommended for you

Intro to Neo4j Webinar
Intro to Neo4j WebinarIntro to Neo4j Webinar
Intro to Neo4j Webinar

In this webinar we discuss the primary use cases for Graph Databases and explore the properties of Neo4j that make those use cases possible. We cover the high-level steps of modeling, importing, and querying your data using Cypher and give an overview of the transition from RDBMS to Graph.

rdbmsgraph dbneo4j
NoSQL Graph Databases - Why, When and Where
NoSQL Graph Databases - Why, When and WhereNoSQL Graph Databases - Why, When and Where
NoSQL Graph Databases - Why, When and Where

NoSQL Graph Databases - Why, When And Where should we use it. Graph DB - The new era of understanding data

nosqlneo4jbig data
Introduction to Graph databases and Neo4j (by Stefan Armbruster)
Introduction to Graph databases and Neo4j (by Stefan Armbruster)Introduction to Graph databases and Neo4j (by Stefan Armbruster)
Introduction to Graph databases and Neo4j (by Stefan Armbruster)

Introduction to Graph databases and Neo4j (by Stefan Armbruster / @darthvader42) inside the Barcelona Java Users's Group last 28/11

neo4jgraph databasesbarcelonajug
Outline
• Why need Big data and AI
• Intro to FC Engine and Knowledge Graph
• Case 1: Anti-Fraud
• Case 2: Lost Contact Recovery
• Case 3: Detect Bad People via Search
• More use cases
• Challenges
• Credit system is not mature in China
• Targeting at under-served market, those who don’t have
enough credit to borrow from bank
• The data solely from credit history is not enough to build the
scoring models
• More efficient application reviewing process is needed as we
move more transactions from offline to online
Why big data & AI
Outline
• Why need Big data and AI
• Intro to FC Engine and Knowledge Graph
• Case 1: Anti-Fraud
• Case 2: Lost Contact Recovery
• Case 3: Detect Bad People via Search
• More use cases
• Challenges
The central problem is
risk control
The solution is to
use big data

Recommended for you

Neo4j the Anti Crime Database
Neo4j the Anti Crime DatabaseNeo4j the Anti Crime Database
Neo4j the Anti Crime Database

This document introduces Neo4j, the world's leading graph database. It discusses Neo4j's product and company details, how graph databases are different than other databases by focusing on relationships between connected data. Common use cases for Neo4j are also summarized, such as recommendations, master data management, network operations, identity and access management, and fraud detection. The document provides examples of how customers use Neo4j and discusses patterns of fraud that Neo4j can help detect.

londongraphtalkgraph database
Graph db
Graph dbGraph db
Graph db

The document discusses using graph databases for insights into connected data. It provides an overview of graph databases, comparing them to relational databases and NoSQL stores. It discusses how graph databases are better suited than other models for richly connected data due to their native support of relationships. The document also covers graph data modeling, the Cypher query language, examples of graph databases in real world domains, and aspects of graph database internals like scalability.

Intro to Graphs and Neo4j
Intro to Graphs and Neo4jIntro to Graphs and Neo4j
Intro to Graphs and Neo4j

This document provides an overview of graph databases and Neo4j. It begins with an introduction to graph databases and their advantages over relational databases for modeling connected data. Examples of real-world use cases that are well-suited for graph databases are given. The document then describes the core components of the graph data model including nodes, relationships, properties, and labels. It provides examples of how to model data as a graph and query graphs using Cypher, the query language for Neo4j. The document concludes by discussing Neo4j as an example of a graph database and its key features and capabilities.

 
by jexp
graph databaseuse-casesintroduction
Measure the risk for a person
Individual
Feature
Analysis
Relation
Analysis
?
Knowledge Graph
Feature Compute(FC)
Engine
• User explicitly input data (i.e. application form)
• Authorized* user data
• Mobile History
• Purchasing History
• ……
• Open Search
• Baidu.com
• 360.com
• Others (i.e. craigslist)
• 3rd- party data (i.e. blacklist)
Data
Unstructured Data
* User authorizes us to use their data
Feature Compute Engine
The goal is to convert unstructured
data to structured features
Feature Compute Engine
Credit Card
Mobile History
Purchasing
......
Precision Marketing
Fraud Score
Risk Score
FeatureCompute
Engine
Feature Container
(tens of thousands)
Data
....
....
Data
Credit Card
History
Mobile
History
Purchasing
History
Feature Compute
Engine
Data
Scoring Model

Recommended for you

Family tree of data – provenance and neo4j
Family tree of data – provenance and neo4jFamily tree of data – provenance and neo4j
Family tree of data – provenance and neo4j

The document discusses using Neo4j, a graph database, to store and query provenance data. Some key points: - Storing provenance in a relational database requires complex SQL and pushes graph operations into code, hurting performance on graph queries. - Neo4j uses the Cypher query language which allows declarative graph queries without imperative code. - Example Cypher queries are provided to demonstrate retrieving paths and relationships in a provenance graph. - While graph databases provide better performance for graph queries, they have limitations for certain bulk scans compared to relational databases. Proper graph design is important.

graphneo4jrelational
RDBMS to Graphs
RDBMS to GraphsRDBMS to Graphs
RDBMS to Graphs

Relational databases were conceived to digitize paper forms and automate well-structured business processes, and still have their uses. But RDBMS cannot model or store data and its relationships without complexity, which means performance degrades with the increasing number and levels of data relationships and data size. Additionally, new types of data and data relationships require schema redesign that increases time to market. A graph database like Neo4j naturally stores, manages, analyzes, and uses data within the context of connections meaning Neo4j provides faster query performance and vastly improved flexibility in handling complex hierarchies than SQL. Join this webinar to learn why companies are shifting away from RDBMS towards graphs to unlock the business value in their data relationships

Democratizing Data at Airbnb
Democratizing Data at AirbnbDemocratizing Data at Airbnb
Democratizing Data at Airbnb

Airbnb aims to democratize data within the company by building a graph database of all internal data resources connected by relationships. This graph is queried through a search interface to help employees explore, discover, and build trust in company data. Challenges include modeling complex data dependencies and proxy nodes, merging graph updates from different sources, and designing a data-dense interface simply. Future goals are to gamify content production, deliver recommendations, certify trusted content, and analyze the information network.

graphconnect europe 2017graph databaseneo4j
Purchasing
History
i.e. Purchasing History
Total amount spent during the last 6 months
User level (i.e. Prime, Normal…)
Total number of transactions during the last 6 months
The length of time he/she uses the account
Total number of transactions related to virtual products
Total number of transactions related to luxury products
………
Few thousand
features
• It is a semantic network
• Based on graph data structure, consists
of points and edges. Point represents
entity, edge represents relationship.
• Knowledge graph connects
heterogeneous information. It provides
the ability to analyze the data from the
perspective of relationship.
What is knowledge graph
Some knowledge graphs
Knowledge graph – search engine

Recommended for you

Introducing Neo4j
Introducing Neo4jIntroducing Neo4j
Introducing Neo4j

This document summarizes a presentation about the graph database Neo4j. The presentation included an agenda that covered graphs and their power, how graphs change data views, and real-time recommendations with graphs. It introduced the presenters and discussed how data relationships unlock value. It described how Neo4j allows modeling data as a graph to unlock this value through relationship-based queries, evolution of applications, and high performance at scale. Examples showed how Neo4j outperforms relational and NoSQL databases when relationships are important. The presentation concluded with examples of how Neo4j customers have benefited.

An Introduction to NOSQL, Graph Databases and Neo4j
An Introduction to NOSQL, Graph Databases and Neo4jAn Introduction to NOSQL, Graph Databases and Neo4j
An Introduction to NOSQL, Graph Databases and Neo4j

Neo4j is a graph database that stores data in nodes and relationships. It allows for efficient querying of connected data through graph traversals. Key aspects include nodes that can contain properties, relationships that connect nodes and also contain properties, and the ability to navigate the graph through traversals. Neo4j provides APIs for common graph operations like creating and removing nodes/relationships, running traversals, and managing transactions. It is well suited for domains that involve connected, semi-structured data like social networks.

Intro to Neo4j and Graph Databases
Intro to Neo4j and Graph DatabasesIntro to Neo4j and Graph Databases
Intro to Neo4j and Graph Databases

These webinar slides are an introduction to Neo4j and Graph Databases. They discuss the primary use cases for Graph Databases and the properties of Neo4j which make those use cases possible. They also cover the high-level steps of modeling, importing, and querying your data using Cypher and touch on RDBMS to Graph.

Knowledge graph – search engine
Knowledge graph – recommendation [1]
Storing Knowledge graph
Ranking DBMS
21 Neo4j (Graph
Database)
32 MarkLogic (XML)
42 Titan (Graph Database)
46 OrientDB (Graph
Database)
61 Virtuoso (RDF)
80 Jena (RDF)
88 Sesmae (RDF)
90 ArangoDB
(GraphDatabase)
120 AllegroGraph (RDF)
Trends for different types of database [2] Graph/RDF database ranking [3]
• Logic-based approach
• Probabilistic approach (i.e. distributed representation)
• Hybrid approach
Key techniques for knowledge graph
Link Prediction

Recommended for you

GraphTalks - Einführung in Graphdatenbanken
GraphTalks - Einführung in GraphdatenbankenGraphTalks - Einführung in Graphdatenbanken
GraphTalks - Einführung in Graphdatenbanken

The document announces a Neo4j GraphTalks event in May 2016. It provides an agenda including presentations on graph databases and Neo4j, a case study from ADAMA on data sharing and knowledge management, and a demonstration of ADAMA's implementation experience. Time is allotted after the presentations for networking and discussions with Neo4j and PRODYNA representatives.

neo4j
Neo4J : Introduction to Graph Database
Neo4J : Introduction to Graph DatabaseNeo4J : Introduction to Graph Database
Neo4J : Introduction to Graph Database

The document is a presentation by Manash Ranjan Rautray on introducing graph databases and Neo4j. It discusses what a graph and graph database are, provides examples to illustrate graphs, and covers the basics of using Neo4j including its data model, query language Cypher, and real-world use cases for graph databases. The presentation aims to explain the concepts and capabilities of Neo4j for storing and querying connected data.

neo4jnosqlgraph
Graphdatenbank Neo4j: Konzept, Positionierung, Status Region DACH - Bruno Un...
 Graphdatenbank Neo4j: Konzept, Positionierung, Status Region DACH - Bruno Un... Graphdatenbank Neo4j: Konzept, Positionierung, Status Region DACH - Bruno Un...
Graphdatenbank Neo4j: Konzept, Positionierung, Status Region DACH - Bruno Un...

This document provides an agenda for a Neo4j partner event. The agenda includes: - Registration and networking from 9:30-10:00 - A presentation on the business potential of Neo4j for system integrators and consultants from 10:00-11:00 - A presentation on the Neo4j partner program from 11:00-11:15 - A break from 11:15-11:30 - A presentation using the example of the Panama Papers dataset to showcase the quick benefits of Neo4j from 11:30-12:30 - Lunch, networking and questions from 12:30 onward

neo4jgraph database
Simple Approach: Pre-define some rules
i.e. (Peter FatherOf Tom) -> (Tom SonOf Peter)
(Peter ColleagueOf Tom), (Sarah ColleagueOf Peter)
-> (Peter ColleaugeOf Sarah)
Logic-based approach
Methods based on distributed representation
• Translating Embedding [4]
• Tensor Factorization (RESCAL) Hybrid approach [5]
• Neural Tensor Network (NTN) [6]
Hybrid Approach – Logic + Probabilistic
Simple Approach:
1. Generating all the new links using pre-define rules
2. Apply Statistical Learning
Advanced Approach (i.e.):
• Incorporation of Rules into Embeddings [7]
• Injecting Logical Background [8]
Use Cases

Recommended for you

Relational to Big Graph
Relational to Big GraphRelational to Big Graph
Relational to Big Graph

Relational databases power most applications, but new use-cases have requirements that they are not well suited for. That's why new approaches like graph databases are used to handle join-heavy, highly-connected and realtime aspects of your applications. This talk compares relational and graph databases, show similarities and important differences. We do a hands-on, deep-dive into ease of data modeling and structural evolution, massive data import and high performance querying with Neo4j, the most popular graph database. I demonstrate a useful tool which makes data import from existing relational databases with a non-denormalized ER-model a "one click"-experience. Which leaves biggest challenge for people coming from a relational background is to adapt some of their existing database experience to new ways of thinking.

load csvmodelingneo4j
TehranDB Meet-up April 2018 Introduction to Graph Database
TehranDB Meet-up April 2018 Introduction to Graph DatabaseTehranDB Meet-up April 2018 Introduction to Graph Database
TehranDB Meet-up April 2018 Introduction to Graph Database

This document provides an introduction and overview of graph databases. It discusses the challenges of relational databases, introduces the property graph data model and discusses the differences between native and non-native graph databases. It also covers the Cypher query language, graph database use cases, and when to use a graph database over SQL. Examples are provided to illustrate graph queries and property graphs.

tehrandbneo4jgraph
Big data
Big dataBig data
Big data

This document provides an overview of big data basics. It discusses how big data is not just about data size but also about analyzing large, diverse datasets from multiple sources. It describes how big data systems can efficiently process huge volumes of data in parallel from petabytes of data. Examples of big data applications include digital marketing, fraud detection, social media analysis, and machine-generated data analytics. Common sources of big data are also listed. The document then covers new analytics approaches for big data and different types of data warehouses. It concludes by discussing current and future trends in data storage and analytics for big data.

big data
Connects person, phone, address, email, company……
Domain-specific knowledge graph
 10 types of entities
 ~50 types of relations
 ~50M entities
 0.2B relations
We expect that it will become ~20 times bigger by the end of this year due to
the business growth
Domain-specific knowledge graph
Outline
• Why need Big data and AI
• Intro to FC Engine and Knowledge Graph
• Case 1: Anti-Fraud
• Case 2: Lost Contact Recovery
• Case 3: Detect Bad People via Search
• More use cases
• Challenges
Applicant shares the
same personal phone
with other applicant
Phone
Applicant
Other
applicant
Personal Phone Personal Phone
Antifraud - rules

Recommended for you

AppStore SEO
AppStore SEOAppStore SEO
AppStore SEO

How to make sure that any mobile app that you are marketing ranks well in the AppStore. Strong SEO strategy in the submission of your application will help to drive long term downloads and traffic to your app.

appstoreapplicationsmobile
Iain Bennett DCMS - 13 04 30 ultra connected cities seminar
Iain Bennett DCMS - 13 04 30 ultra connected cities seminarIain Bennett DCMS - 13 04 30 ultra connected cities seminar
Iain Bennett DCMS - 13 04 30 ultra connected cities seminar

This document summarizes an update on the Ultra Connected Cities Seminar. It discusses the origins and objectives of the Urban Broadband Fund, which aims to encourage ubiquitous high-speed broadband provision and take-up in UK cities. It outlines the responses received during consultations with suppliers on various broadband deployment models. It also discusses the challenges around obtaining state aid approval for connection voucher schemes from the European Commission, and the steps being taken to re-scope city broadband plans and the program to address these challenges.

broadbandurbannga
Rob Hamlin - CityFibre Holdings inca ultra connected cities - gigabit cities ...
Rob Hamlin - CityFibre Holdings inca ultra connected cities - gigabit cities ...Rob Hamlin - CityFibre Holdings inca ultra connected cities - gigabit cities ...
Rob Hamlin - CityFibre Holdings inca ultra connected cities - gigabit cities ...

CityFibre operates fibre optic infrastructure in 50 UK cities, with over 30,000 km of fibre and 130 networks connecting over 400 locations. They have the largest fibre-to-the-home network in the UK. A "Gigabit City" brings educational, healthcare, public safety, and economic benefits through high-speed connectivity. The model involves building out a fibre core network anchored by public sector customers, then expanding to businesses, mobile networks, and consumers with fibre-to-the-premises. York, UK has successfully developed a shared network for services like CCTV and WiFi, and is marketing fibre to businesses to become Europe's most digitally connected city by 2015.

broadbandngafibre
Applicant and other
applicant share the
same colleague phone,
but with different
company names
Phone
Applicant
Other
applicant
Colleague phone
Company 1 Company 2
Colleague phone
Antifraud – rules (cont.)
Phone
Applicant
Personal phone
Phone
Phone
Phone
Phone
Phone
Overdue
Overdue
Some of the
applicant’s contacts
didn’t pay back the
loan on time
Antifraud – rules (cont.)
Person 2
Person 1
Triangle relationship
Person 3
Antifraud – cycle detection
Applicant Applicant 2
Parent of Parent of
Applicant 1
Spouse
Inconsistent relations
Antifraud – inconsistent relationship

Recommended for you

Research project presentation for Managing Global Sourcing
Research project presentation for Managing Global SourcingResearch project presentation for Managing Global Sourcing
Research project presentation for Managing Global Sourcing

How Accenture has leveraged their global delivery network to develop in-house capabilities in the field of Digital and Analytics. The Centre of Excellence (COE) at both onshore and offshore locations have played a crucial role in driving innovation through Accenture

analyticsdigitaldublin
The Impact of Machine Learning on Digital Commerce
The Impact of Machine Learning on Digital CommerceThe Impact of Machine Learning on Digital Commerce
The Impact of Machine Learning on Digital Commerce

How will machine learning change the digital e-commerce experience? and more importantly how is changing it right now? From personalization, merchandising to fraud detection; let's explore how machine learning is already touching arguably all areas of the e-commerce ecosystem.

digital commerceecommerceprogramming
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps

This document proposes a system to detect ranking fraud for mobile apps. It investigates three types of evidence: ranking, rating, and review behaviors. The existing systems for related problems like web spam and review spam detection are insufficient for detecting ranking fraud in apps. The proposed system accurately locates fraudulent ranking periods in apps, and uses an optimization method to aggregate all evidence types to identify ranking fraud. It was evaluated on real app data and performed effectively at scale.

java ieee project ppt
Antifraud – suspicious group
Person 2
Person 1
Person 3
Share a lot of
common attributes
Knowledge Graph
Visualization • Visualize entities and
relationships
• Design anti-fraud rules
via observational study
Antifraud – design by observation
Rapid change of
relationship structure
within short time period
Antifraud – evolution of graph structure
LR
Decision Tree
Random Forest
SVM
ANN
Models Prediction
Extracted
Features from
Raw Data
Results from
anti-fraud
rules
User direct
attributes
Variables
DNN
Score is used to
directly reject or
accept the loan
Antifraud – fraud score
score

Recommended for you

Sensing WiFi Network for Personal IoT Analytics
Sensing WiFi Network for Personal IoT Analytics Sensing WiFi Network for Personal IoT Analytics
Sensing WiFi Network for Personal IoT Analytics

We present the design, implementation and evaluation of an enabling platform for locating and querying physical objects using existing WiFi network. We propose the use of WiFi management probes as a data transport mechanism for physical objects that are tagged with WiFi-enabled accelerometers and are capable of determining their state-of-use based on motion signatures. A local WiFi gateway captures these probes emitted from the connected objects and stores them locally after annotating them with a coarse grained location estimate using a proximity ranging algorithm. External applications can query the aggregated views of state-of-use and location traces of connected objects through a cloud-based query server. We present the technical architecture and algorithms of the proposed platform together with a prototype personal object analytics application and assess the feasibility of our different design decisions. This work makes important contributions by demonstrating that it is possible to build a pure network-based IoT analytics platform with only location and motion signatures of connected objects, and that the WiFi network is the key enabler for the future IoT applications.

physical analyticssmart objectscloudlet
Stephen Hilton - ND2012 Day 1, Plenary 2: Super-connected Cities
Stephen Hilton - ND2012 Day 1, Plenary 2: Super-connected CitiesStephen Hilton - ND2012 Day 1, Plenary 2: Super-connected Cities
Stephen Hilton - ND2012 Day 1, Plenary 2: Super-connected Cities

The document discusses Bristol's plans to become a "Gigabit City" with readily available high-speed internet connectivity. It notes that local businesses and organizations increasingly require high-bandwidth connections for tasks like video production and communication. Bristol aims to provide gigabit connectivity to 5000 businesses, 5000 university students, and 5000 social housing tenants. It also plans to expand the citywide wireless network and use the improved connectivity to foster innovation through partnerships between different sectors.

#goonnd2012stephen hiltondigital
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsDiscovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps

The document discusses a proposed system for detecting ranking fraud for mobile apps. It begins by describing existing ranking fraud and some current detection systems. It then outlines the proposed system which first identifies "leading sessions" in an app's historical ranking data that indicate periods of popularity. It then detects fraud by analyzing ranking, rating, and review behaviors during these sessions using statistical tests. Finally, the proposed system aggregates all the evidence to evaluate sessions for fraud and was tested on real app store data.

Outline
• Why need Big data and AI
• Intro to FC Engine and Knowledge Graph
• Case 1: Anti-Fraud
• Case 2: Lost Contact Recovery
• Case 3: Detect Bad People via Search
• More use cases
• Challenges
The borrowers disappear, all the contact information they
explicitly provided become invalid. How to reach them?
Lost contact recovery – what is it
Implicitly infer potential contact information
Phone
Applicant
Personal phone
Phone
Phone
Phone
Phone
Phone
Rank the phone numbers,
and predict relationship
Building phone network – 1st order extension
Building phone network – 2nd order extension
Phone
Applicant
Personal phone
Phone
Phone
Phone
Phone
Phone
Phone
Phone
Phone
Phone
Phone
Rank the phone
numbers, and
predict relationship

Recommended for you

12.07.2012 T8 Connected Cities, Daniela Krautsack (Cows in Jackets) & Joanna ...
12.07.2012 T8 Connected Cities, Daniela Krautsack (Cows in Jackets) & Joanna ...12.07.2012 T8 Connected Cities, Daniela Krautsack (Cows in Jackets) & Joanna ...
12.07.2012 T8 Connected Cities, Daniela Krautsack (Cows in Jackets) & Joanna ...

The document discusses how connected cities and consumers are changing the relationship between brands and municipalities. As more people live in urban areas and use mobile devices, brands are finding new ways to engage with citizens and contribute to cities. Some of the opportunities discussed include improving infrastructure, celebrating neighborhoods, providing useful apps and services, developing future city concepts, enhancing the urban experience, and letting citizens help shape their city. The document argues that brands should contribute value to communities rather than just focus on promotion, and that open data and platforms can improve cities.

"Blockchains for AI", Trent McConaghy, AI researcher, blockchain engineer. Fo...
"Blockchains for AI", Trent McConaghy, AI researcher, blockchain engineer. Fo..."Blockchains for AI", Trent McConaghy, AI researcher, blockchain engineer. Fo...
"Blockchains for AI", Trent McConaghy, AI researcher, blockchain engineer. Fo...

"Blockchains for AI", Trent McConaghy, AI researcher, blockchain engineer. Founder & CTO of BigchainDB | IPDB | ascribe | Solido

big datadata scienceblockchain
Oliver Scheer, Technical Evangelist at Microsoft, "SQL Azure, Power BI (embed...
Oliver Scheer, Technical Evangelist at Microsoft, "SQL Azure, Power BI (embed...Oliver Scheer, Technical Evangelist at Microsoft, "SQL Azure, Power BI (embed...
Oliver Scheer, Technical Evangelist at Microsoft, "SQL Azure, Power BI (embed...

Oliver Scheer, Technical Evangelist at Microsoft, "SQL Azure, Power BI (embedded) and PowerApps with sport data"

sqlbig datadataconomy
3rd order ..
Phone
Applicant
Personal phone
Phone
Phone
Phone
Phone
Phone
Phone
Phone
Phone
Phone
Phone
Phone
Phone
Simple Ranking Criteria
• The total length of time
• The frequency of calls
Advanced Approach
• Learning the ranking score using machine learning approach
Building phone network – Rank
• Total # of times of calling
• Total length of time of
calling
• Total # of times of being
called
• Total # of times of calling
• Average time per call
• Maximum length of time
• # of times of calling
between 0-4am
• # of times of calling
between 4-8am
• ……
Building phone network – Predict the relation
LR
Decision Tree
Random Forest
SVM
ANN
Models
Prediction of relation
~100 Features
DNN
Relation
With very limited
training data, our
model provides
~30% accuracy
Person
Applicant
Personal phone
Person
Other
applicant
knows?
Other approach – Link prediction (on-going work)
Link Prediction

Recommended for you

Smart Connected Cities Cisco Vision & Perspective by Ravinder Pal Singh
Smart Connected Cities Cisco Vision & Perspective by Ravinder Pal SinghSmart Connected Cities Cisco Vision & Perspective by Ravinder Pal Singh
Smart Connected Cities Cisco Vision & Perspective by Ravinder Pal Singh

The document discusses the concept of smart connected cities and how digital infrastructure and internet of everything technologies can enable smart city capabilities. It notes that everything will be connected by 2050 with 50 billion connected devices and that application-centric infrastructure will be essential. It describes how smart city services across different domains like transportation, healthcare, and energy can be integrated and outlines the benefits of smart sustainable communities like reductions in crime, traffic, and resource consumption. Finally, it provides an example of how Cisco has helped the city of Barcelona create a smart city that generated billions in value and thousands of new jobs through integrated smart services and technologies.

PERFORMIX.Wien 2016 – Search ohnne Keywords – Viktor Zemann (traffic3)
PERFORMIX.Wien 2016 – Search ohnne Keywords – Viktor Zemann (traffic3)PERFORMIX.Wien 2016 – Search ohnne Keywords – Viktor Zemann (traffic3)
PERFORMIX.Wien 2016 – Search ohnne Keywords – Viktor Zemann (traffic3)

Neben den klassischen Searchkampagnen mit Keywords gibt es in Google AdWords inzwischen mehrere Möglichkeiten die eigene Website zu bewerben ohne ein einziges Keyword einzubuchen. Mit Google Shopping-Kampagnen, die inzwischen schon knapp 15 Jahre alt sind und in dieser Zeit mehrfach seitens Google generalüberholt wurden, bewerben E-Commerce-Kunden ihr Produktsortiment mit Hilfe von Produktdatenfeeds - ganz ohne Keywords. Nicht selten stechen die Shopping-Kampagnen die klassischen Searchkampagnen in Punkto Performance aus - allerdings nur, wenn auf die Feinheiten bei Feederstellung und Optimierung geachtet wurde. Wie Sie Ihre Feeds optimal erstellen und optimieren bzw. wie Sie sicherstellen können, dass Ihre Produkte die gewünschte Sichtbarkeit bei Google Shopping bekommen, erklärt Viktor Zemann in seinem praxisnahen Vortrag. Für Kunden, die nicht im ECommerce-Bereich beheimatet sind (es sehr wohl aber auch sein können), stellt Google mit Dynamischen Suchanzeigen, kurz DSA, eine spannende Funktion zur Verfügung, um mit Hilfe des organischen Suchindex passende Zielseiten zu (Longtail-)Anfragen zu finden und dafür dynamisch generierte Anzeigen zu schalten. Durch die korrekte Verwendung von DSAs kann - vor allem auf sehr contentreichen Websites/Websitebereichen - zusätzlich hochrelevanter Traffic generiert werden, der einem ansonsten verloren gegangen wäre. Viktor Zemann erklärt die Best Practices und zeigt, worauf Sie beim Arbeiten mit DSAs achten müssen.

2016search campaignssearch index
Smart Cities UK 2016
Smart Cities UK 2016Smart Cities UK 2016
Smart Cities UK 2016

Across the UK we are seeing more and more examples of smart city transformation. Key 'smart' sectors utilised by such Cities include transport, energy, health care, water and waste. Against the current background of economic, social, security and technological changes caused by the globalization and the integration process, cities in the UK face the challenge of combining competitiveness and sustainable urban development simultaneously. A smart city is a place where the traditional networks and services are made more efficient with the use of digital and telecommunication technologies, for the benefit of its inhabitants and businesses. With this vision in mind, the European Union is investing in ICT research and innovation and developing policies to improve the quality of life of citizens and make cities more sustainable in view of Europe's 20-20-20 targets. The smart city concept goes beyond the use of ICT for better resource use and less emissions. It means smarter urban transport networks, upgraded water supply and waste disposal facilities, and more efficient ways to light and heat buildings. And it also encompasses a more interactive and responsive city administration, safer and secure public spaces. Smart Cities UK lead the way on addressing the best practice examples on smart transformation from across Cities within the United Kingdom whilst disseminating guidance and information transformation within waste, energy, transport and other key smart sectors.

digitalcitiestelecommunications
Outline
• Why need Big data and AI
• Intro to FC Engine and Knowledge Graph
• Case 1: Anti-Fraud
• Case 2: Lost Contact Recovery
• Case 3: Detect Bad People via Search
• More use cases
• Challenges
Detect Bad People via Search
From the search results, we label each
entities in the knowledge graph i.e. black,
green etc.
• Baidu.com
• 360.com
• other public
websites
Search for basic information….
• Phone number
• Email
• QQ
• Other IDs
Search Fields Search Engines & Public Site
Search for phone number…

Recommended for you

Connected Retail: Running the Store with IoT
Connected Retail: Running the Store with IoTConnected Retail: Running the Store with IoT
Connected Retail: Running the Store with IoT

MIT Enterprise Forum of Cambridge Connected Things 2017 panel "Connected Retail: Running the Store with IoT"

iotaervachainlink research
Hacking health: IoT, analytics and other trends
Hacking health: IoT, analytics and other trendsHacking health: IoT, analytics and other trends
Hacking health: IoT, analytics and other trends

The document discusses emerging technology trends including wearable devices, iBeacons, contextual computing, the Internet of Things (IoT), and analytics. Wearables such as smartwatches and fitness trackers are becoming more common. iBeacons enable micro-location services indoors. Contextual computing uses information about a user's context to improve services. The growth of connected devices as part of the IoT is generating large amounts of data that can be analyzed for insights using analytics platforms.

iot health wearables beacon microlocation analytic
Sören Eickhoff, Informatica GmbH, "Informatica Intelligent Data Lake – Self S...
Sören Eickhoff, Informatica GmbH, "Informatica Intelligent Data Lake – Self S...Sören Eickhoff, Informatica GmbH, "Informatica Intelligent Data Lake – Self S...
Sören Eickhoff, Informatica GmbH, "Informatica Intelligent Data Lake – Self S...

Sören Eickhoff, Informatica GmbH "Informatica Intelligent Data Lake – Self Service for Data Analysts"

data analystbig datadataconomy
Search for Email…
Fraud
• Clustering analysis
• Precision marketing
• ……
Other Applications we are working on
Outline
• Why need Big data and AI
• Intro to FC Engine and Knowledge Graph
• Case 1: Anti-Fraud
• Case 2: Lost Contact Recovery
• Case 3: Detect Bad People via Search
• More use cases
• Challenges
Challenges : Unstructured Data
Unstructured
Data
Images
Text
AudioVideo
Machine Learning
Natural Language
Processing
Data Mining

Recommended for you

Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India

Mobile security issues and frauds in India are discussed. Several cases of fraud through SMS phishing, hacking of government websites, SMS scams collecting hundreds of millions of rupees, online credit card fraud on eBay, fake Orkut profiles, and MMS porn scams are described. Authentication, data encryption, firewalls, and intrusion prevention systems are recommended for better mobile security and cybercrime control. The conclusion emphasizes applying strong security concepts without backdoors to protect e-commerce and information technology in India.

mobile security
Big Data in FinTech
Big Data in FinTechBig Data in FinTech
Big Data in FinTech

The document discusses how big data is being applied in financial technology (FinTech). It begins with an agenda and introduction to the speaker, Mahmoud Jalajel. It then discusses how tech companies are leading innovations in FinTech through applications like money transfers. The bulk of the document outlines key concepts in big data including ingestion, ETL processes, software, analytics, and data science. It provides examples of how these are applied in FinTech for areas like predictive modeling, personalization, and fraud detection. Finally, it shares two case studies of startups leveraging big data for applications like automated lending and risk management.

fintechfinancial technologybig data
Usama Fayyad talk in South Africa: From BigData to Data Science
Usama Fayyad talk in South Africa:  From BigData to Data ScienceUsama Fayyad talk in South Africa:  From BigData to Data Science
Usama Fayyad talk in South Africa: From BigData to Data Science

Public talk by Barclays CDO Usama Fayyad in South Africa: both at University of Pretoria (GIBS) - Johannesburg and at Workshop17 in Capetown July 14-15, 2015

analytics case studiesdata miningapplications of predictive analytics and bigdata
Challenges : Name Disambiguation
Applicant
Other
applicant
Puhui
Finance
Ltd.
Puhui
Finance
Same company, can
we merge?
It is a very important
problem to deal with!
Challenges : Reasoning
However, It is still an open problem
• Logic-based approach
• Probabilistic approach (i.e. distributed representation)
• Hybrid approach
Link Prediction
Challenges : Insufficient Samples
Big data, but small samples
• Senior/Lead Machine Learning/NLP Engineers
• Senior/Lead Data Engineer/Scientist
• Senior/Lead Architect
• Senior/Lead Software Engineer
liwenzhe@puhuifinance.com
zhaopin@puhuifinance.com
We are hiring! (in Beijing)
Open positions, but not limited to….
Contact
Company Website
www.puhuifinance.com

Recommended for you

4 Ways AI Can Help Your Small Business
4 Ways AI Can Help Your Small Business4 Ways AI Can Help Your Small Business
4 Ways AI Can Help Your Small Business

A introduction to AI/machine learning focused less on theory and more on the practical applications to an SMB or working professional. Four specific use cases are covered. Talk given to the Taiwanese American Chamber of Commerce in August 2017.

aimachine learningsmall business
apidays LIVE Hong Kong 2021 - Federated Learning for Banking by Isaac Wong, W...
apidays LIVE Hong Kong 2021 - Federated Learning for Banking by Isaac Wong, W...apidays LIVE Hong Kong 2021 - Federated Learning for Banking by Isaac Wong, W...
apidays LIVE Hong Kong 2021 - Federated Learning for Banking by Isaac Wong, W...

apidays LIVE Hong Kong 2021 - API Ecosystem & Data Interchange August 25 & 26, 2021 Federated Learning for Banking Isaac Wong, AI Solution Architect at WeBank

apidaysapidays hong kongapidays live hong kong
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"

The document discusses obstacles to collaboration between law enforcement and industry in fighting cybercrime and fraud, and proposes solutions to overcome these obstacles. It outlines how the National Cyber-Forensic Training Alliance (NCFTA) has helped facilitate collaboration by serving as a neutral third party where intelligence can be shared and cases developed jointly. Some key inhibitors to collaboration discussed include different views of the scope of the problem between industry and law enforcement, concerns about what information can be shared and with whom, and a lack of understanding of each other's resources and context. The NCFTA model aims to address these by focusing on cross-sector intelligence sharing and resource pooling between industry and law enforcement.

Email:
nadalwz1115@hotmail.com
nadalwz1115@gmail.com
Wechat(微信):
liwenzhe595675
Thanks!
[1] http://www.datapop.com/
[2] http://db-engines.com/en/blog_post//43
[3] http://db-engines.com/en/ranking
[4] Bordes, Antoine, et al. "Translating Embeddings for Modeling Multi-
relational Data." Advances in Neural Information Processing
Systems(2013):2787-2795.
[5] Nickel, Maximilian, V. Tresp, and H. P. Kriegel. "A Three-Way Model
for Collective Learning on Multi-Relational Data.." International
Conference on Machine Learning 2011:809-816.
References
[6] Richard Socher, Danqi Chen, Christopher D. Manning, Andrew Ng.
Reasoning With Neural Tensor Networks for Knowledge Base
Completion. Advances in Neural Information Processing Systems(2013)
[7] Wang, Quan, Wang, Bin, and Guo, Li. "Knowledge base completion
using embeddings and rules." Proceedings of the 24th International
Conference on Artificial Intelligence AAAI Press, 2015.
[8] T Rocktäschel,S Singh,S Riedel. Injecting Logical Background
Knowledge into Embeddings for Relation Extraction
http://talks.cam.ac.uk/talk/index/58360
References

More Related Content

What's hot

Neo4j graphs in the real world - graph days d.c. - april 14, 2015
Neo4j   graphs in the real world - graph days d.c. - april 14, 2015Neo4j   graphs in the real world - graph days d.c. - april 14, 2015
Neo4j graphs in the real world - graph days d.c. - april 14, 2015
Neo4j
 
Graph based data models
Graph based data modelsGraph based data models
Graph based data models
Moumie Soulemane
 
Introduction to graph databases GraphDays
Introduction to graph databases  GraphDaysIntroduction to graph databases  GraphDays
Introduction to graph databases GraphDays
Neo4j
 
Intro to Neo4j Webinar
Intro to Neo4j WebinarIntro to Neo4j Webinar
Intro to Neo4j Webinar
Neo4j
 
NoSQL Graph Databases - Why, When and Where
NoSQL Graph Databases - Why, When and WhereNoSQL Graph Databases - Why, When and Where
NoSQL Graph Databases - Why, When and Where
Eugene Hanikblum
 
Introduction to Graph databases and Neo4j (by Stefan Armbruster)
Introduction to Graph databases and Neo4j (by Stefan Armbruster)Introduction to Graph databases and Neo4j (by Stefan Armbruster)
Introduction to Graph databases and Neo4j (by Stefan Armbruster)
barcelonajug
 
Neo4j the Anti Crime Database
Neo4j the Anti Crime DatabaseNeo4j the Anti Crime Database
Neo4j the Anti Crime Database
Neo4j
 
Graph db
Graph dbGraph db
Graph db
Gagan Agrawal
 
Intro to Graphs and Neo4j
Intro to Graphs and Neo4jIntro to Graphs and Neo4j
Intro to Graphs and Neo4j
jexp
 
Family tree of data – provenance and neo4j
Family tree of data – provenance and neo4jFamily tree of data – provenance and neo4j
Family tree of data – provenance and neo4j
M. David Allen
 
RDBMS to Graphs
RDBMS to GraphsRDBMS to Graphs
RDBMS to Graphs
Neo4j
 
Democratizing Data at Airbnb
Democratizing Data at AirbnbDemocratizing Data at Airbnb
Democratizing Data at Airbnb
Neo4j
 
Introducing Neo4j
Introducing Neo4jIntroducing Neo4j
Introducing Neo4j
Neo4j
 
An Introduction to NOSQL, Graph Databases and Neo4j
An Introduction to NOSQL, Graph Databases and Neo4jAn Introduction to NOSQL, Graph Databases and Neo4j
An Introduction to NOSQL, Graph Databases and Neo4j
Debanjan Mahata
 
Intro to Neo4j and Graph Databases
Intro to Neo4j and Graph DatabasesIntro to Neo4j and Graph Databases
Intro to Neo4j and Graph Databases
Neo4j
 
GraphTalks - Einführung in Graphdatenbanken
GraphTalks - Einführung in GraphdatenbankenGraphTalks - Einführung in Graphdatenbanken
GraphTalks - Einführung in Graphdatenbanken
Neo4j
 
Neo4J : Introduction to Graph Database
Neo4J : Introduction to Graph DatabaseNeo4J : Introduction to Graph Database
Neo4J : Introduction to Graph Database
Mindfire Solutions
 
Graphdatenbank Neo4j: Konzept, Positionierung, Status Region DACH - Bruno Un...
 Graphdatenbank Neo4j: Konzept, Positionierung, Status Region DACH - Bruno Un... Graphdatenbank Neo4j: Konzept, Positionierung, Status Region DACH - Bruno Un...
Graphdatenbank Neo4j: Konzept, Positionierung, Status Region DACH - Bruno Un...
Neo4j
 
Relational to Big Graph
Relational to Big GraphRelational to Big Graph
Relational to Big Graph
Neo4j
 
TehranDB Meet-up April 2018 Introduction to Graph Database
TehranDB Meet-up April 2018 Introduction to Graph DatabaseTehranDB Meet-up April 2018 Introduction to Graph Database
TehranDB Meet-up April 2018 Introduction to Graph Database
Hamoon Mohammadian Pour
 

What's hot (20)

Neo4j graphs in the real world - graph days d.c. - april 14, 2015
Neo4j   graphs in the real world - graph days d.c. - april 14, 2015Neo4j   graphs in the real world - graph days d.c. - april 14, 2015
Neo4j graphs in the real world - graph days d.c. - april 14, 2015
 
Graph based data models
Graph based data modelsGraph based data models
Graph based data models
 
Introduction to graph databases GraphDays
Introduction to graph databases  GraphDaysIntroduction to graph databases  GraphDays
Introduction to graph databases GraphDays
 
Intro to Neo4j Webinar
Intro to Neo4j WebinarIntro to Neo4j Webinar
Intro to Neo4j Webinar
 
NoSQL Graph Databases - Why, When and Where
NoSQL Graph Databases - Why, When and WhereNoSQL Graph Databases - Why, When and Where
NoSQL Graph Databases - Why, When and Where
 
Introduction to Graph databases and Neo4j (by Stefan Armbruster)
Introduction to Graph databases and Neo4j (by Stefan Armbruster)Introduction to Graph databases and Neo4j (by Stefan Armbruster)
Introduction to Graph databases and Neo4j (by Stefan Armbruster)
 
Neo4j the Anti Crime Database
Neo4j the Anti Crime DatabaseNeo4j the Anti Crime Database
Neo4j the Anti Crime Database
 
Graph db
Graph dbGraph db
Graph db
 
Intro to Graphs and Neo4j
Intro to Graphs and Neo4jIntro to Graphs and Neo4j
Intro to Graphs and Neo4j
 
Family tree of data – provenance and neo4j
Family tree of data – provenance and neo4jFamily tree of data – provenance and neo4j
Family tree of data – provenance and neo4j
 
RDBMS to Graphs
RDBMS to GraphsRDBMS to Graphs
RDBMS to Graphs
 
Democratizing Data at Airbnb
Democratizing Data at AirbnbDemocratizing Data at Airbnb
Democratizing Data at Airbnb
 
Introducing Neo4j
Introducing Neo4jIntroducing Neo4j
Introducing Neo4j
 
An Introduction to NOSQL, Graph Databases and Neo4j
An Introduction to NOSQL, Graph Databases and Neo4jAn Introduction to NOSQL, Graph Databases and Neo4j
An Introduction to NOSQL, Graph Databases and Neo4j
 
Intro to Neo4j and Graph Databases
Intro to Neo4j and Graph DatabasesIntro to Neo4j and Graph Databases
Intro to Neo4j and Graph Databases
 
GraphTalks - Einführung in Graphdatenbanken
GraphTalks - Einführung in GraphdatenbankenGraphTalks - Einführung in Graphdatenbanken
GraphTalks - Einführung in Graphdatenbanken
 
Neo4J : Introduction to Graph Database
Neo4J : Introduction to Graph DatabaseNeo4J : Introduction to Graph Database
Neo4J : Introduction to Graph Database
 
Graphdatenbank Neo4j: Konzept, Positionierung, Status Region DACH - Bruno Un...
 Graphdatenbank Neo4j: Konzept, Positionierung, Status Region DACH - Bruno Un... Graphdatenbank Neo4j: Konzept, Positionierung, Status Region DACH - Bruno Un...
Graphdatenbank Neo4j: Konzept, Positionierung, Status Region DACH - Bruno Un...
 
Relational to Big Graph
Relational to Big GraphRelational to Big Graph
Relational to Big Graph
 
TehranDB Meet-up April 2018 Introduction to Graph Database
TehranDB Meet-up April 2018 Introduction to Graph DatabaseTehranDB Meet-up April 2018 Introduction to Graph Database
TehranDB Meet-up April 2018 Introduction to Graph Database
 

Viewers also liked

Big data
Big dataBig data
AppStore SEO
AppStore SEOAppStore SEO
AppStore SEO
MobileMoxie
 
Iain Bennett DCMS - 13 04 30 ultra connected cities seminar
Iain Bennett DCMS - 13 04 30 ultra connected cities seminarIain Bennett DCMS - 13 04 30 ultra connected cities seminar
Iain Bennett DCMS - 13 04 30 ultra connected cities seminar
Independent Networks Co-operative Association
 
Rob Hamlin - CityFibre Holdings inca ultra connected cities - gigabit cities ...
Rob Hamlin - CityFibre Holdings inca ultra connected cities - gigabit cities ...Rob Hamlin - CityFibre Holdings inca ultra connected cities - gigabit cities ...
Rob Hamlin - CityFibre Holdings inca ultra connected cities - gigabit cities ...
Independent Networks Co-operative Association
 
Research project presentation for Managing Global Sourcing
Research project presentation for Managing Global SourcingResearch project presentation for Managing Global Sourcing
Research project presentation for Managing Global Sourcing
nipunhanda
 
The Impact of Machine Learning on Digital Commerce
The Impact of Machine Learning on Digital CommerceThe Impact of Machine Learning on Digital Commerce
The Impact of Machine Learning on Digital Commerce
Allan MacGregor
 
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps
Nagamalleswararao Tadikonda
 
Sensing WiFi Network for Personal IoT Analytics
Sensing WiFi Network for Personal IoT Analytics Sensing WiFi Network for Personal IoT Analytics
Sensing WiFi Network for Personal IoT Analytics
Fahim Kawsar
 
Stephen Hilton - ND2012 Day 1, Plenary 2: Super-connected Cities
Stephen Hilton - ND2012 Day 1, Plenary 2: Super-connected CitiesStephen Hilton - ND2012 Day 1, Plenary 2: Super-connected Cities
Stephen Hilton - ND2012 Day 1, Plenary 2: Super-connected Cities
GoONND2012
 
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsDiscovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps
Nexgen Technology
 
12.07.2012 T8 Connected Cities, Daniela Krautsack (Cows in Jackets) & Joanna ...
12.07.2012 T8 Connected Cities, Daniela Krautsack (Cows in Jackets) & Joanna ...12.07.2012 T8 Connected Cities, Daniela Krautsack (Cows in Jackets) & Joanna ...
12.07.2012 T8 Connected Cities, Daniela Krautsack (Cows in Jackets) & Joanna ...
Werbeplanung.at Summit
 
"Blockchains for AI", Trent McConaghy, AI researcher, blockchain engineer. Fo...
"Blockchains for AI", Trent McConaghy, AI researcher, blockchain engineer. Fo..."Blockchains for AI", Trent McConaghy, AI researcher, blockchain engineer. Fo...
"Blockchains for AI", Trent McConaghy, AI researcher, blockchain engineer. Fo...
Dataconomy Media
 
Oliver Scheer, Technical Evangelist at Microsoft, "SQL Azure, Power BI (embed...
Oliver Scheer, Technical Evangelist at Microsoft, "SQL Azure, Power BI (embed...Oliver Scheer, Technical Evangelist at Microsoft, "SQL Azure, Power BI (embed...
Oliver Scheer, Technical Evangelist at Microsoft, "SQL Azure, Power BI (embed...
Dataconomy Media
 
Smart Connected Cities Cisco Vision & Perspective by Ravinder Pal Singh
Smart Connected Cities Cisco Vision & Perspective by Ravinder Pal SinghSmart Connected Cities Cisco Vision & Perspective by Ravinder Pal Singh
Smart Connected Cities Cisco Vision & Perspective by Ravinder Pal Singh
IPPAI
 
PERFORMIX.Wien 2016 – Search ohnne Keywords – Viktor Zemann (traffic3)
PERFORMIX.Wien 2016 – Search ohnne Keywords – Viktor Zemann (traffic3)PERFORMIX.Wien 2016 – Search ohnne Keywords – Viktor Zemann (traffic3)
PERFORMIX.Wien 2016 – Search ohnne Keywords – Viktor Zemann (traffic3)
Werbeplanung.at Summit
 
Smart Cities UK 2016
Smart Cities UK 2016Smart Cities UK 2016
Smart Cities UK 2016
4 All of Us
 
Connected Retail: Running the Store with IoT
Connected Retail: Running the Store with IoTConnected Retail: Running the Store with IoT
Connected Retail: Running the Store with IoT
MIT Enterprise Forum Cambridge
 
Hacking health: IoT, analytics and other trends
Hacking health: IoT, analytics and other trendsHacking health: IoT, analytics and other trends
Hacking health: IoT, analytics and other trends
Jim Boland
 
Sören Eickhoff, Informatica GmbH, "Informatica Intelligent Data Lake – Self S...
Sören Eickhoff, Informatica GmbH, "Informatica Intelligent Data Lake – Self S...Sören Eickhoff, Informatica GmbH, "Informatica Intelligent Data Lake – Self S...
Sören Eickhoff, Informatica GmbH, "Informatica Intelligent Data Lake – Self S...
Dataconomy Media
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
Yogesh Lolge
 

Viewers also liked (20)

Big data
Big dataBig data
Big data
 
AppStore SEO
AppStore SEOAppStore SEO
AppStore SEO
 
Iain Bennett DCMS - 13 04 30 ultra connected cities seminar
Iain Bennett DCMS - 13 04 30 ultra connected cities seminarIain Bennett DCMS - 13 04 30 ultra connected cities seminar
Iain Bennett DCMS - 13 04 30 ultra connected cities seminar
 
Rob Hamlin - CityFibre Holdings inca ultra connected cities - gigabit cities ...
Rob Hamlin - CityFibre Holdings inca ultra connected cities - gigabit cities ...Rob Hamlin - CityFibre Holdings inca ultra connected cities - gigabit cities ...
Rob Hamlin - CityFibre Holdings inca ultra connected cities - gigabit cities ...
 
Research project presentation for Managing Global Sourcing
Research project presentation for Managing Global SourcingResearch project presentation for Managing Global Sourcing
Research project presentation for Managing Global Sourcing
 
The Impact of Machine Learning on Digital Commerce
The Impact of Machine Learning on Digital CommerceThe Impact of Machine Learning on Digital Commerce
The Impact of Machine Learning on Digital Commerce
 
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps
 
Sensing WiFi Network for Personal IoT Analytics
Sensing WiFi Network for Personal IoT Analytics Sensing WiFi Network for Personal IoT Analytics
Sensing WiFi Network for Personal IoT Analytics
 
Stephen Hilton - ND2012 Day 1, Plenary 2: Super-connected Cities
Stephen Hilton - ND2012 Day 1, Plenary 2: Super-connected CitiesStephen Hilton - ND2012 Day 1, Plenary 2: Super-connected Cities
Stephen Hilton - ND2012 Day 1, Plenary 2: Super-connected Cities
 
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsDiscovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps
 
12.07.2012 T8 Connected Cities, Daniela Krautsack (Cows in Jackets) & Joanna ...
12.07.2012 T8 Connected Cities, Daniela Krautsack (Cows in Jackets) & Joanna ...12.07.2012 T8 Connected Cities, Daniela Krautsack (Cows in Jackets) & Joanna ...
12.07.2012 T8 Connected Cities, Daniela Krautsack (Cows in Jackets) & Joanna ...
 
"Blockchains for AI", Trent McConaghy, AI researcher, blockchain engineer. Fo...
"Blockchains for AI", Trent McConaghy, AI researcher, blockchain engineer. Fo..."Blockchains for AI", Trent McConaghy, AI researcher, blockchain engineer. Fo...
"Blockchains for AI", Trent McConaghy, AI researcher, blockchain engineer. Fo...
 
Oliver Scheer, Technical Evangelist at Microsoft, "SQL Azure, Power BI (embed...
Oliver Scheer, Technical Evangelist at Microsoft, "SQL Azure, Power BI (embed...Oliver Scheer, Technical Evangelist at Microsoft, "SQL Azure, Power BI (embed...
Oliver Scheer, Technical Evangelist at Microsoft, "SQL Azure, Power BI (embed...
 
Smart Connected Cities Cisco Vision & Perspective by Ravinder Pal Singh
Smart Connected Cities Cisco Vision & Perspective by Ravinder Pal SinghSmart Connected Cities Cisco Vision & Perspective by Ravinder Pal Singh
Smart Connected Cities Cisco Vision & Perspective by Ravinder Pal Singh
 
PERFORMIX.Wien 2016 – Search ohnne Keywords – Viktor Zemann (traffic3)
PERFORMIX.Wien 2016 – Search ohnne Keywords – Viktor Zemann (traffic3)PERFORMIX.Wien 2016 – Search ohnne Keywords – Viktor Zemann (traffic3)
PERFORMIX.Wien 2016 – Search ohnne Keywords – Viktor Zemann (traffic3)
 
Smart Cities UK 2016
Smart Cities UK 2016Smart Cities UK 2016
Smart Cities UK 2016
 
Connected Retail: Running the Store with IoT
Connected Retail: Running the Store with IoTConnected Retail: Running the Store with IoT
Connected Retail: Running the Store with IoT
 
Hacking health: IoT, analytics and other trends
Hacking health: IoT, analytics and other trendsHacking health: IoT, analytics and other trends
Hacking health: IoT, analytics and other trends
 
Sören Eickhoff, Informatica GmbH, "Informatica Intelligent Data Lake – Self S...
Sören Eickhoff, Informatica GmbH, "Informatica Intelligent Data Lake – Self S...Sören Eickhoff, Informatica GmbH, "Informatica Intelligent Data Lake – Self S...
Sören Eickhoff, Informatica GmbH, "Informatica Intelligent Data Lake – Self S...
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
 

Similar to Bigdata and ai in p2 p industry: Knowledge graph and inference

Big Data in FinTech
Big Data in FinTechBig Data in FinTech
Big Data in FinTech
Mahmoud Jalajel
 
Usama Fayyad talk in South Africa: From BigData to Data Science
Usama Fayyad talk in South Africa:  From BigData to Data ScienceUsama Fayyad talk in South Africa:  From BigData to Data Science
Usama Fayyad talk in South Africa: From BigData to Data Science
Usama Fayyad
 
4 Ways AI Can Help Your Small Business
4 Ways AI Can Help Your Small Business4 Ways AI Can Help Your Small Business
4 Ways AI Can Help Your Small Business
Keita Broadwater
 
apidays LIVE Hong Kong 2021 - Federated Learning for Banking by Isaac Wong, W...
apidays LIVE Hong Kong 2021 - Federated Learning for Banking by Isaac Wong, W...apidays LIVE Hong Kong 2021 - Federated Learning for Banking by Isaac Wong, W...
apidays LIVE Hong Kong 2021 - Federated Learning for Banking by Isaac Wong, W...
apidays
 
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Vivastream
 
Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"
Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"
Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"
Vivastream
 
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Vivastream
 
Pasoco ITSMF,SPMI-PDPA-140626-public
Pasoco ITSMF,SPMI-PDPA-140626-publicPasoco ITSMF,SPMI-PDPA-140626-public
Pasoco ITSMF,SPMI-PDPA-140626-public
PasocoPteLtd
 
SiriusDecisions Explores the Need for Demand Orchestration
SiriusDecisions Explores the Need for Demand OrchestrationSiriusDecisions Explores the Need for Demand Orchestration
SiriusDecisions Explores the Need for Demand Orchestration
Integrate
 
Big Data, Big Investment
Big Data, Big InvestmentBig Data, Big Investment
Big Data, Big Investment
GGV Capital
 
AI Foundations Course Module 1 - An AI Transformation Journey
AI Foundations Course Module 1 - An AI Transformation JourneyAI Foundations Course Module 1 - An AI Transformation Journey
AI Foundations Course Module 1 - An AI Transformation Journey
Sri Ambati
 
Minne analytics presentation 2018 12 03 final compressed
Minne analytics presentation 2018 12 03 final   compressedMinne analytics presentation 2018 12 03 final   compressed
Minne analytics presentation 2018 12 03 final compressed
Bonnie Holub
 
Slides of “Into the Deep Web: Understanding E-commerce Fraud from Autonomous ...
Slides of “Into the Deep Web: Understanding E-commerce Fraud from Autonomous ...Slides of “Into the Deep Web: Understanding E-commerce Fraud from Autonomous ...
Slides of “Into the Deep Web: Understanding E-commerce Fraud from Autonomous ...
PierantonioAzzalini
 
Use of Advanced Technology in Procurement
Use of Advanced Technology in ProcurementUse of Advanced Technology in Procurement
Use of Advanced Technology in Procurement
Dr Mark Lovatt
 
Digital Experiences Using a Conversational Interface
Digital Experiences Using a Conversational InterfaceDigital Experiences Using a Conversational Interface
Digital Experiences Using a Conversational Interface
Bala Iyer
 
Machine Learning Adoption: Crossing the chasm for banking and insurance sector
Machine Learning Adoption: Crossing the chasm for banking and insurance sectorMachine Learning Adoption: Crossing the chasm for banking and insurance sector
Machine Learning Adoption: Crossing the chasm for banking and insurance sector
Rudradeb Mitra
 
Digital Marketing Analytics Certification - Session One
Digital Marketing Analytics Certification - Session OneDigital Marketing Analytics Certification - Session One
Digital Marketing Analytics Certification - Session One
Brand Digital, Inc
 
Building Open Data Markets Using Sensing as a Service Model
Building Open Data Markets Using Sensing as a Service ModelBuilding Open Data Markets Using Sensing as a Service Model
Building Open Data Markets Using Sensing as a Service Model
Charith Perera
 
Trust in the age of blockchain
Trust in the age of blockchainTrust in the age of blockchain
Trust in the age of blockchain
MicheleNati
 
Minne analytics presentation 2018 12 03 final compressed
Minne analytics presentation 2018 12 03 final   compressedMinne analytics presentation 2018 12 03 final   compressed
Minne analytics presentation 2018 12 03 final compressed
Bonnie Holub
 

Similar to Bigdata and ai in p2 p industry: Knowledge graph and inference (20)

Big Data in FinTech
Big Data in FinTechBig Data in FinTech
Big Data in FinTech
 
Usama Fayyad talk in South Africa: From BigData to Data Science
Usama Fayyad talk in South Africa:  From BigData to Data ScienceUsama Fayyad talk in South Africa:  From BigData to Data Science
Usama Fayyad talk in South Africa: From BigData to Data Science
 
4 Ways AI Can Help Your Small Business
4 Ways AI Can Help Your Small Business4 Ways AI Can Help Your Small Business
4 Ways AI Can Help Your Small Business
 
apidays LIVE Hong Kong 2021 - Federated Learning for Banking by Isaac Wong, W...
apidays LIVE Hong Kong 2021 - Federated Learning for Banking by Isaac Wong, W...apidays LIVE Hong Kong 2021 - Federated Learning for Banking by Isaac Wong, W...
apidays LIVE Hong Kong 2021 - Federated Learning for Banking by Isaac Wong, W...
 
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
 
Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"
Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"
Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"
 
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
 
Pasoco ITSMF,SPMI-PDPA-140626-public
Pasoco ITSMF,SPMI-PDPA-140626-publicPasoco ITSMF,SPMI-PDPA-140626-public
Pasoco ITSMF,SPMI-PDPA-140626-public
 
SiriusDecisions Explores the Need for Demand Orchestration
SiriusDecisions Explores the Need for Demand OrchestrationSiriusDecisions Explores the Need for Demand Orchestration
SiriusDecisions Explores the Need for Demand Orchestration
 
Big Data, Big Investment
Big Data, Big InvestmentBig Data, Big Investment
Big Data, Big Investment
 
AI Foundations Course Module 1 - An AI Transformation Journey
AI Foundations Course Module 1 - An AI Transformation JourneyAI Foundations Course Module 1 - An AI Transformation Journey
AI Foundations Course Module 1 - An AI Transformation Journey
 
Minne analytics presentation 2018 12 03 final compressed
Minne analytics presentation 2018 12 03 final   compressedMinne analytics presentation 2018 12 03 final   compressed
Minne analytics presentation 2018 12 03 final compressed
 
Slides of “Into the Deep Web: Understanding E-commerce Fraud from Autonomous ...
Slides of “Into the Deep Web: Understanding E-commerce Fraud from Autonomous ...Slides of “Into the Deep Web: Understanding E-commerce Fraud from Autonomous ...
Slides of “Into the Deep Web: Understanding E-commerce Fraud from Autonomous ...
 
Use of Advanced Technology in Procurement
Use of Advanced Technology in ProcurementUse of Advanced Technology in Procurement
Use of Advanced Technology in Procurement
 
Digital Experiences Using a Conversational Interface
Digital Experiences Using a Conversational InterfaceDigital Experiences Using a Conversational Interface
Digital Experiences Using a Conversational Interface
 
Machine Learning Adoption: Crossing the chasm for banking and insurance sector
Machine Learning Adoption: Crossing the chasm for banking and insurance sectorMachine Learning Adoption: Crossing the chasm for banking and insurance sector
Machine Learning Adoption: Crossing the chasm for banking and insurance sector
 
Digital Marketing Analytics Certification - Session One
Digital Marketing Analytics Certification - Session OneDigital Marketing Analytics Certification - Session One
Digital Marketing Analytics Certification - Session One
 
Building Open Data Markets Using Sensing as a Service Model
Building Open Data Markets Using Sensing as a Service ModelBuilding Open Data Markets Using Sensing as a Service Model
Building Open Data Markets Using Sensing as a Service Model
 
Trust in the age of blockchain
Trust in the age of blockchainTrust in the age of blockchain
Trust in the age of blockchain
 
Minne analytics presentation 2018 12 03 final compressed
Minne analytics presentation 2018 12 03 final   compressedMinne analytics presentation 2018 12 03 final   compressed
Minne analytics presentation 2018 12 03 final compressed
 

Recently uploaded

Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides
Safe Software
 
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
Toru Tamaki
 
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Muhammad Ali
 
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdfPigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions
 
Applying Retrieval-Augmented Generation (RAG) to Combat Hallucinations in GenAI
Applying Retrieval-Augmented Generation (RAG) to Combat Hallucinations in GenAIApplying Retrieval-Augmented Generation (RAG) to Combat Hallucinations in GenAI
Applying Retrieval-Augmented Generation (RAG) to Combat Hallucinations in GenAI
ssuserd4e0d2
 
Gen-AI in Telcos: Strategies, Challenges & Impact | Torry Harris Integration ...
Gen-AI in Telcos: Strategies, Challenges & Impact | Torry Harris Integration ...Gen-AI in Telcos: Strategies, Challenges & Impact | Torry Harris Integration ...
Gen-AI in Telcos: Strategies, Challenges & Impact | Torry Harris Integration ...
Torry Harris
 
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Chris Swan
 
(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
Priyanka Aash
 
ARTIFICIAL INTELLIGENCE (AI) IN MUSIC.pdf
ARTIFICIAL INTELLIGENCE (AI) IN MUSIC.pdfARTIFICIAL INTELLIGENCE (AI) IN MUSIC.pdf
ARTIFICIAL INTELLIGENCE (AI) IN MUSIC.pdf
Inglês no Mundo Digital
 
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionAdvanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Bert Blevins
 
Implementations of Fused Deposition Modeling in real world
Implementations of Fused Deposition Modeling  in real worldImplementations of Fused Deposition Modeling  in real world
Implementations of Fused Deposition Modeling in real world
Emerging Tech
 
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
Kief Morris
 
IPLOOK Remote-Sensing Satellite Solution
IPLOOK Remote-Sensing Satellite SolutionIPLOOK Remote-Sensing Satellite Solution
IPLOOK Remote-Sensing Satellite Solution
IPLOOK Networks
 
The Role of Technology in Payroll Statutory Compliance (1).pdf
The Role of Technology in Payroll Statutory Compliance (1).pdfThe Role of Technology in Payroll Statutory Compliance (1).pdf
The Role of Technology in Payroll Statutory Compliance (1).pdf
paysquare consultancy
 
Evolution of iPaaS - simplify IT workloads to provide a unified view of data...
Evolution of iPaaS - simplify IT workloads to provide a unified view of  data...Evolution of iPaaS - simplify IT workloads to provide a unified view of  data...
Evolution of iPaaS - simplify IT workloads to provide a unified view of data...
Torry Harris
 
Comparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdfComparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdf
Andrey Yasko
 
7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf
Enterprise Wired
 
Password Rotation in 2024 is still Relevant
Password Rotation in 2024 is still RelevantPassword Rotation in 2024 is still Relevant
Password Rotation in 2024 is still Relevant
Bert Blevins
 
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALLBLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
Liveplex
 
“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...
“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...
“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...
Edge AI and Vision Alliance
 

Recently uploaded (20)

Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides
 
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
 
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
 
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdfPigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdf
 
Applying Retrieval-Augmented Generation (RAG) to Combat Hallucinations in GenAI
Applying Retrieval-Augmented Generation (RAG) to Combat Hallucinations in GenAIApplying Retrieval-Augmented Generation (RAG) to Combat Hallucinations in GenAI
Applying Retrieval-Augmented Generation (RAG) to Combat Hallucinations in GenAI
 
Gen-AI in Telcos: Strategies, Challenges & Impact | Torry Harris Integration ...
Gen-AI in Telcos: Strategies, Challenges & Impact | Torry Harris Integration ...Gen-AI in Telcos: Strategies, Challenges & Impact | Torry Harris Integration ...
Gen-AI in Telcos: Strategies, Challenges & Impact | Torry Harris Integration ...
 
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
 
(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
 
ARTIFICIAL INTELLIGENCE (AI) IN MUSIC.pdf
ARTIFICIAL INTELLIGENCE (AI) IN MUSIC.pdfARTIFICIAL INTELLIGENCE (AI) IN MUSIC.pdf
ARTIFICIAL INTELLIGENCE (AI) IN MUSIC.pdf
 
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionAdvanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
 
Implementations of Fused Deposition Modeling in real world
Implementations of Fused Deposition Modeling  in real worldImplementations of Fused Deposition Modeling  in real world
Implementations of Fused Deposition Modeling in real world
 
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
 
IPLOOK Remote-Sensing Satellite Solution
IPLOOK Remote-Sensing Satellite SolutionIPLOOK Remote-Sensing Satellite Solution
IPLOOK Remote-Sensing Satellite Solution
 
The Role of Technology in Payroll Statutory Compliance (1).pdf
The Role of Technology in Payroll Statutory Compliance (1).pdfThe Role of Technology in Payroll Statutory Compliance (1).pdf
The Role of Technology in Payroll Statutory Compliance (1).pdf
 
Evolution of iPaaS - simplify IT workloads to provide a unified view of data...
Evolution of iPaaS - simplify IT workloads to provide a unified view of  data...Evolution of iPaaS - simplify IT workloads to provide a unified view of  data...
Evolution of iPaaS - simplify IT workloads to provide a unified view of data...
 
Comparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdfComparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdf
 
7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf
 
Password Rotation in 2024 is still Relevant
Password Rotation in 2024 is still RelevantPassword Rotation in 2024 is still Relevant
Password Rotation in 2024 is still Relevant
 
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALLBLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
 
“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...
“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...
“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...
 

Bigdata and ai in p2 p industry: Knowledge graph and inference

  • 1. Big Data and AI in P2P Industry Wenzhe Li nadalwz1115@gmail.com Feb 1, 2016
  • 2. Puhui Finance (www.puhuifinance.com) Services 爱钱 进 普惠 信贷 创新 资产 普惠 财富 • Internet Financing P2P company, headquarters in Beijing • Founded in July 2013 • $50M series A funding in Dec 2014 • ~5500 employees, 100+ offline stores Offline Financing Service Online Financing Service Online Lending Service Offline Lending Service
  • 3. Puhui Finance (cont.) Fastest growing p2p company. Big data technology is the key
  • 4. In this talk, I will mainly focus on the techniques used in lending side risk control. Similar techniques can be applied to the financing side. What the talk is about
  • 5. Outline • Why need Big data and AI • Intro to FC Engine and Knowledge Graph • Case 1: Anti-Fraud • Case 2: Lost Contact Recovery • Case 3: Detect Bad People via Search • More use cases • Challenges
  • 6. • Credit system is not mature in China • Targeting at under-served market, those who don’t have enough credit to borrow from bank • The data solely from credit history is not enough to build the scoring models • More efficient application reviewing process is needed as we move more transactions from offline to online Why big data & AI
  • 7. Outline • Why need Big data and AI • Intro to FC Engine and Knowledge Graph • Case 1: Anti-Fraud • Case 2: Lost Contact Recovery • Case 3: Detect Bad People via Search • More use cases • Challenges
  • 8. The central problem is risk control The solution is to use big data
  • 9. Measure the risk for a person Individual Feature Analysis Relation Analysis ? Knowledge Graph Feature Compute(FC) Engine
  • 10. • User explicitly input data (i.e. application form) • Authorized* user data • Mobile History • Purchasing History • …… • Open Search • Baidu.com • 360.com • Others (i.e. craigslist) • 3rd- party data (i.e. blacklist) Data Unstructured Data * User authorizes us to use their data
  • 11. Feature Compute Engine The goal is to convert unstructured data to structured features
  • 12. Feature Compute Engine Credit Card Mobile History Purchasing ...... Precision Marketing Fraud Score Risk Score FeatureCompute Engine Feature Container (tens of thousands) Data .... .... Data Credit Card History Mobile History Purchasing History Feature Compute Engine Data Scoring Model
  • 13. Purchasing History i.e. Purchasing History Total amount spent during the last 6 months User level (i.e. Prime, Normal…) Total number of transactions during the last 6 months The length of time he/she uses the account Total number of transactions related to virtual products Total number of transactions related to luxury products ……… Few thousand features
  • 14. • It is a semantic network • Based on graph data structure, consists of points and edges. Point represents entity, edge represents relationship. • Knowledge graph connects heterogeneous information. It provides the ability to analyze the data from the perspective of relationship. What is knowledge graph
  • 16. Knowledge graph – search engine
  • 17. Knowledge graph – search engine
  • 18. Knowledge graph – recommendation [1]
  • 19. Storing Knowledge graph Ranking DBMS 21 Neo4j (Graph Database) 32 MarkLogic (XML) 42 Titan (Graph Database) 46 OrientDB (Graph Database) 61 Virtuoso (RDF) 80 Jena (RDF) 88 Sesmae (RDF) 90 ArangoDB (GraphDatabase) 120 AllegroGraph (RDF) Trends for different types of database [2] Graph/RDF database ranking [3]
  • 20. • Logic-based approach • Probabilistic approach (i.e. distributed representation) • Hybrid approach Key techniques for knowledge graph Link Prediction
  • 21. Simple Approach: Pre-define some rules i.e. (Peter FatherOf Tom) -> (Tom SonOf Peter) (Peter ColleagueOf Tom), (Sarah ColleagueOf Peter) -> (Peter ColleaugeOf Sarah) Logic-based approach
  • 22. Methods based on distributed representation • Translating Embedding [4] • Tensor Factorization (RESCAL) Hybrid approach [5] • Neural Tensor Network (NTN) [6]
  • 23. Hybrid Approach – Logic + Probabilistic Simple Approach: 1. Generating all the new links using pre-define rules 2. Apply Statistical Learning Advanced Approach (i.e.): • Incorporation of Rules into Embeddings [7] • Injecting Logical Background [8]
  • 25. Connects person, phone, address, email, company…… Domain-specific knowledge graph
  • 26.  10 types of entities  ~50 types of relations  ~50M entities  0.2B relations We expect that it will become ~20 times bigger by the end of this year due to the business growth Domain-specific knowledge graph
  • 27. Outline • Why need Big data and AI • Intro to FC Engine and Knowledge Graph • Case 1: Anti-Fraud • Case 2: Lost Contact Recovery • Case 3: Detect Bad People via Search • More use cases • Challenges
  • 28. Applicant shares the same personal phone with other applicant Phone Applicant Other applicant Personal Phone Personal Phone Antifraud - rules
  • 29. Applicant and other applicant share the same colleague phone, but with different company names Phone Applicant Other applicant Colleague phone Company 1 Company 2 Colleague phone Antifraud – rules (cont.)
  • 30. Phone Applicant Personal phone Phone Phone Phone Phone Phone Overdue Overdue Some of the applicant’s contacts didn’t pay back the loan on time Antifraud – rules (cont.)
  • 31. Person 2 Person 1 Triangle relationship Person 3 Antifraud – cycle detection
  • 32. Applicant Applicant 2 Parent of Parent of Applicant 1 Spouse Inconsistent relations Antifraud – inconsistent relationship
  • 33. Antifraud – suspicious group Person 2 Person 1 Person 3 Share a lot of common attributes
  • 34. Knowledge Graph Visualization • Visualize entities and relationships • Design anti-fraud rules via observational study Antifraud – design by observation
  • 35. Rapid change of relationship structure within short time period Antifraud – evolution of graph structure
  • 36. LR Decision Tree Random Forest SVM ANN Models Prediction Extracted Features from Raw Data Results from anti-fraud rules User direct attributes Variables DNN Score is used to directly reject or accept the loan Antifraud – fraud score score
  • 37. Outline • Why need Big data and AI • Intro to FC Engine and Knowledge Graph • Case 1: Anti-Fraud • Case 2: Lost Contact Recovery • Case 3: Detect Bad People via Search • More use cases • Challenges
  • 38. The borrowers disappear, all the contact information they explicitly provided become invalid. How to reach them? Lost contact recovery – what is it Implicitly infer potential contact information
  • 39. Phone Applicant Personal phone Phone Phone Phone Phone Phone Rank the phone numbers, and predict relationship Building phone network – 1st order extension
  • 40. Building phone network – 2nd order extension Phone Applicant Personal phone Phone Phone Phone Phone Phone Phone Phone Phone Phone Phone Rank the phone numbers, and predict relationship
  • 41. 3rd order .. Phone Applicant Personal phone Phone Phone Phone Phone Phone Phone Phone Phone Phone Phone Phone Phone
  • 42. Simple Ranking Criteria • The total length of time • The frequency of calls Advanced Approach • Learning the ranking score using machine learning approach Building phone network – Rank
  • 43. • Total # of times of calling • Total length of time of calling • Total # of times of being called • Total # of times of calling • Average time per call • Maximum length of time • # of times of calling between 0-4am • # of times of calling between 4-8am • …… Building phone network – Predict the relation LR Decision Tree Random Forest SVM ANN Models Prediction of relation ~100 Features DNN Relation With very limited training data, our model provides ~30% accuracy
  • 44. Person Applicant Personal phone Person Other applicant knows? Other approach – Link prediction (on-going work) Link Prediction
  • 45. Outline • Why need Big data and AI • Intro to FC Engine and Knowledge Graph • Case 1: Anti-Fraud • Case 2: Lost Contact Recovery • Case 3: Detect Bad People via Search • More use cases • Challenges
  • 46. Detect Bad People via Search From the search results, we label each entities in the knowledge graph i.e. black, green etc.
  • 47. • Baidu.com • 360.com • other public websites Search for basic information…. • Phone number • Email • QQ • Other IDs Search Fields Search Engines & Public Site
  • 48. Search for phone number…
  • 50. • Clustering analysis • Precision marketing • …… Other Applications we are working on
  • 51. Outline • Why need Big data and AI • Intro to FC Engine and Knowledge Graph • Case 1: Anti-Fraud • Case 2: Lost Contact Recovery • Case 3: Detect Bad People via Search • More use cases • Challenges
  • 52. Challenges : Unstructured Data Unstructured Data Images Text AudioVideo Machine Learning Natural Language Processing Data Mining
  • 53. Challenges : Name Disambiguation Applicant Other applicant Puhui Finance Ltd. Puhui Finance Same company, can we merge? It is a very important problem to deal with!
  • 54. Challenges : Reasoning However, It is still an open problem • Logic-based approach • Probabilistic approach (i.e. distributed representation) • Hybrid approach Link Prediction
  • 55. Challenges : Insufficient Samples Big data, but small samples
  • 56. • Senior/Lead Machine Learning/NLP Engineers • Senior/Lead Data Engineer/Scientist • Senior/Lead Architect • Senior/Lead Software Engineer liwenzhe@puhuifinance.com zhaopin@puhuifinance.com We are hiring! (in Beijing) Open positions, but not limited to…. Contact Company Website www.puhuifinance.com
  • 58. [1] http://www.datapop.com/ [2] http://db-engines.com/en/blog_post//43 [3] http://db-engines.com/en/ranking [4] Bordes, Antoine, et al. "Translating Embeddings for Modeling Multi- relational Data." Advances in Neural Information Processing Systems(2013):2787-2795. [5] Nickel, Maximilian, V. Tresp, and H. P. Kriegel. "A Three-Way Model for Collective Learning on Multi-Relational Data.." International Conference on Machine Learning 2011:809-816. References
  • 59. [6] Richard Socher, Danqi Chen, Christopher D. Manning, Andrew Ng. Reasoning With Neural Tensor Networks for Knowledge Base Completion. Advances in Neural Information Processing Systems(2013) [7] Wang, Quan, Wang, Bin, and Guo, Li. "Knowledge base completion using embeddings and rules." Proceedings of the 24th International Conference on Artificial Intelligence AAAI Press, 2015. [8] T Rocktäschel,S Singh,S Riedel. Injecting Logical Background Knowledge into Embeddings for Relation Extraction http://talks.cam.ac.uk/talk/index/58360 References