SlideShare a Scribd company logo
Big Data and AI in P2P
Industry
Wenzhe Li
nadalwz1115@gmail.com
Feb 1, 2016
Puhui Finance (www.puhuifinance.com)
Services
爱钱
进
普惠
信贷
创新
资产
普惠
财富
• Internet Financing P2P
company, headquarters
in Beijing
• Founded in July 2013
• $50M series A funding in
Dec 2014
• ~5500 employees, 100+
offline stores
Offline Financing
Service
Online Financing
Service
Online Lending
Service
Offline Lending
Service
Puhui Finance (cont.)
Fastest growing p2p
company. Big data
technology is the key
In this talk, I will mainly focus on the
techniques used in lending side risk control.
Similar techniques can be applied to the
financing side.
What the talk is about
Outline
• Why need Big data and AI
• Intro to FC Engine and Knowledge Graph
• Case 1: Anti-Fraud
• Case 2: Lost Contact Recovery
• Case 3: Detect Bad People via Search
• More use cases
• Challenges
• Credit system is not mature in China
• Targeting at under-served market, those who don’t have
enough credit to borrow from bank
• The data solely from credit history is not enough to build the
scoring models
• More efficient application reviewing process is needed as we
move more transactions from offline to online
Why big data & AI
Outline
• Why need Big data and AI
• Intro to FC Engine and Knowledge Graph
• Case 1: Anti-Fraud
• Case 2: Lost Contact Recovery
• Case 3: Detect Bad People via Search
• More use cases
• Challenges
The central problem is
risk control
The solution is to
use big data
Measure the risk for a person
Individual
Feature
Analysis
Relation
Analysis
?
Knowledge Graph
Feature Compute(FC)
Engine
• User explicitly input data (i.e. application form)
• Authorized* user data
• Mobile History
• Purchasing History
• ……
• Open Search
• Baidu.com
• 360.com
• Others (i.e. craigslist)
• 3rd- party data (i.e. blacklist)
Data
Unstructured Data
* User authorizes us to use their data
Feature Compute Engine
The goal is to convert unstructured
data to structured features
Feature Compute Engine
Credit Card
Mobile History
Purchasing
......
Precision Marketing
Fraud Score
Risk Score
FeatureCompute
Engine
Feature Container
(tens of thousands)
Data
....
....
Data
Credit Card
History
Mobile
History
Purchasing
History
Feature Compute
Engine
Data
Scoring Model
Purchasing
History
i.e. Purchasing History
Total amount spent during the last 6 months
User level (i.e. Prime, Normal…)
Total number of transactions during the last 6 months
The length of time he/she uses the account
Total number of transactions related to virtual products
Total number of transactions related to luxury products
………
Few thousand
features
• It is a semantic network
• Based on graph data structure, consists
of points and edges. Point represents
entity, edge represents relationship.
• Knowledge graph connects
heterogeneous information. It provides
the ability to analyze the data from the
perspective of relationship.
What is knowledge graph
Some knowledge graphs
Knowledge graph – search engine
Knowledge graph – search engine
Knowledge graph – recommendation [1]
Storing Knowledge graph
Ranking DBMS
21 Neo4j (Graph
Database)
32 MarkLogic (XML)
42 Titan (Graph Database)
46 OrientDB (Graph
Database)
61 Virtuoso (RDF)
80 Jena (RDF)
88 Sesmae (RDF)
90 ArangoDB
(GraphDatabase)
120 AllegroGraph (RDF)
Trends for different types of database [2] Graph/RDF database ranking [3]
• Logic-based approach
• Probabilistic approach (i.e. distributed representation)
• Hybrid approach
Key techniques for knowledge graph
Link Prediction
Simple Approach: Pre-define some rules
i.e. (Peter FatherOf Tom) -> (Tom SonOf Peter)
(Peter ColleagueOf Tom), (Sarah ColleagueOf Peter)
-> (Peter ColleaugeOf Sarah)
Logic-based approach
Methods based on distributed representation
• Translating Embedding [4]
• Tensor Factorization (RESCAL) Hybrid approach [5]
• Neural Tensor Network (NTN) [6]
Hybrid Approach – Logic + Probabilistic
Simple Approach:
1. Generating all the new links using pre-define rules
2. Apply Statistical Learning
Advanced Approach (i.e.):
• Incorporation of Rules into Embeddings [7]
• Injecting Logical Background [8]
Use Cases
Connects person, phone, address, email, company……
Domain-specific knowledge graph
 10 types of entities
 ~50 types of relations
 ~50M entities
 0.2B relations
We expect that it will become ~20 times bigger by the end of this year due to
the business growth
Domain-specific knowledge graph
Outline
• Why need Big data and AI
• Intro to FC Engine and Knowledge Graph
• Case 1: Anti-Fraud
• Case 2: Lost Contact Recovery
• Case 3: Detect Bad People via Search
• More use cases
• Challenges
Applicant shares the
same personal phone
with other applicant
Phone
Applicant
Other
applicant
Personal Phone Personal Phone
Antifraud - rules
Applicant and other
applicant share the
same colleague phone,
but with different
company names
Phone
Applicant
Other
applicant
Colleague phone
Company 1 Company 2
Colleague phone
Antifraud – rules (cont.)
Phone
Applicant
Personal phone
Phone
Phone
Phone
Phone
Phone
Overdue
Overdue
Some of the
applicant’s contacts
didn’t pay back the
loan on time
Antifraud – rules (cont.)
Person 2
Person 1
Triangle relationship
Person 3
Antifraud – cycle detection
Applicant Applicant 2
Parent of Parent of
Applicant 1
Spouse
Inconsistent relations
Antifraud – inconsistent relationship
Antifraud – suspicious group
Person 2
Person 1
Person 3
Share a lot of
common attributes
Knowledge Graph
Visualization • Visualize entities and
relationships
• Design anti-fraud rules
via observational study
Antifraud – design by observation
Rapid change of
relationship structure
within short time period
Antifraud – evolution of graph structure
LR
Decision Tree
Random Forest
SVM
ANN
Models Prediction
Extracted
Features from
Raw Data
Results from
anti-fraud
rules
User direct
attributes
Variables
DNN
Score is used to
directly reject or
accept the loan
Antifraud – fraud score
score
Outline
• Why need Big data and AI
• Intro to FC Engine and Knowledge Graph
• Case 1: Anti-Fraud
• Case 2: Lost Contact Recovery
• Case 3: Detect Bad People via Search
• More use cases
• Challenges
The borrowers disappear, all the contact information they
explicitly provided become invalid. How to reach them?
Lost contact recovery – what is it
Implicitly infer potential contact information
Phone
Applicant
Personal phone
Phone
Phone
Phone
Phone
Phone
Rank the phone numbers,
and predict relationship
Building phone network – 1st order extension
Building phone network – 2nd order extension
Phone
Applicant
Personal phone
Phone
Phone
Phone
Phone
Phone
Phone
Phone
Phone
Phone
Phone
Rank the phone
numbers, and
predict relationship
3rd order ..
Phone
Applicant
Personal phone
Phone
Phone
Phone
Phone
Phone
Phone
Phone
Phone
Phone
Phone
Phone
Phone
Simple Ranking Criteria
• The total length of time
• The frequency of calls
Advanced Approach
• Learning the ranking score using machine learning approach
Building phone network – Rank
• Total # of times of calling
• Total length of time of
calling
• Total # of times of being
called
• Total # of times of calling
• Average time per call
• Maximum length of time
• # of times of calling
between 0-4am
• # of times of calling
between 4-8am
• ……
Building phone network – Predict the relation
LR
Decision Tree
Random Forest
SVM
ANN
Models
Prediction of relation
~100 Features
DNN
Relation
With very limited
training data, our
model provides
~30% accuracy
Person
Applicant
Personal phone
Person
Other
applicant
knows?
Other approach – Link prediction (on-going work)
Link Prediction
Outline
• Why need Big data and AI
• Intro to FC Engine and Knowledge Graph
• Case 1: Anti-Fraud
• Case 2: Lost Contact Recovery
• Case 3: Detect Bad People via Search
• More use cases
• Challenges
Detect Bad People via Search
From the search results, we label each
entities in the knowledge graph i.e. black,
green etc.
• Baidu.com
• 360.com
• other public
websites
Search for basic information….
• Phone number
• Email
• QQ
• Other IDs
Search Fields Search Engines & Public Site
Search for phone number…
Search for Email…
Fraud
• Clustering analysis
• Precision marketing
• ……
Other Applications we are working on
Outline
• Why need Big data and AI
• Intro to FC Engine and Knowledge Graph
• Case 1: Anti-Fraud
• Case 2: Lost Contact Recovery
• Case 3: Detect Bad People via Search
• More use cases
• Challenges
Challenges : Unstructured Data
Unstructured
Data
Images
Text
AudioVideo
Machine Learning
Natural Language
Processing
Data Mining
Challenges : Name Disambiguation
Applicant
Other
applicant
Puhui
Finance
Ltd.
Puhui
Finance
Same company, can
we merge?
It is a very important
problem to deal with!
Challenges : Reasoning
However, It is still an open problem
• Logic-based approach
• Probabilistic approach (i.e. distributed representation)
• Hybrid approach
Link Prediction
Challenges : Insufficient Samples
Big data, but small samples
• Senior/Lead Machine Learning/NLP Engineers
• Senior/Lead Data Engineer/Scientist
• Senior/Lead Architect
• Senior/Lead Software Engineer
liwenzhe@puhuifinance.com
zhaopin@puhuifinance.com
We are hiring! (in Beijing)
Open positions, but not limited to….
Contact
Company Website
www.puhuifinance.com
Email:
nadalwz1115@hotmail.com
nadalwz1115@gmail.com
Wechat(微信):
liwenzhe595675
Thanks!
[1] http://www.datapop.com/
[2] http://db-engines.com/en/blog_post//43
[3] http://db-engines.com/en/ranking
[4] Bordes, Antoine, et al. "Translating Embeddings for Modeling Multi-
relational Data." Advances in Neural Information Processing
Systems(2013):2787-2795.
[5] Nickel, Maximilian, V. Tresp, and H. P. Kriegel. "A Three-Way Model
for Collective Learning on Multi-Relational Data.." International
Conference on Machine Learning 2011:809-816.
References
[6] Richard Socher, Danqi Chen, Christopher D. Manning, Andrew Ng.
Reasoning With Neural Tensor Networks for Knowledge Base
Completion. Advances in Neural Information Processing Systems(2013)
[7] Wang, Quan, Wang, Bin, and Guo, Li. "Knowledge base completion
using embeddings and rules." Proceedings of the 24th International
Conference on Artificial Intelligence AAAI Press, 2015.
[8] T Rocktäschel,S Singh,S Riedel. Injecting Logical Background
Knowledge into Embeddings for Relation Extraction
http://talks.cam.ac.uk/talk/index/58360
References

More Related Content

What's hot (20)

PPTX
Neo4j graphs in the real world - graph days d.c. - april 14, 2015
Neo4j
 
PDF
Graph based data models
Moumie Soulemane
 
PDF
Introduction to graph databases GraphDays
Neo4j
 
PDF
Intro to Neo4j Webinar
Neo4j
 
PPTX
NoSQL Graph Databases - Why, When and Where
Eugene Hanikblum
 
PDF
Introduction to Graph databases and Neo4j (by Stefan Armbruster)
barcelonajug
 
PDF
Neo4j the Anti Crime Database
Neo4j
 
PPT
Graph db
Gagan Agrawal
 
PDF
Intro to Graphs and Neo4j
jexp
 
PPTX
Family tree of data – provenance and neo4j
M. David Allen
 
PDF
RDBMS to Graphs
Neo4j
 
PDF
Democratizing Data at Airbnb
Neo4j
 
PDF
Introducing Neo4j
Neo4j
 
PPTX
An Introduction to NOSQL, Graph Databases and Neo4j
Debanjan Mahata
 
PDF
Intro to Neo4j and Graph Databases
Neo4j
 
PPTX
GraphTalks - Einführung in Graphdatenbanken
Neo4j
 
PPT
Neo4J : Introduction to Graph Database
Mindfire Solutions
 
PPTX
Graphdatenbank Neo4j: Konzept, Positionierung, Status Region DACH - Bruno Un...
Neo4j
 
PDF
Relational to Big Graph
Neo4j
 
PDF
TehranDB Meet-up April 2018 Introduction to Graph Database
Hamoon Mohammadian Pour
 
Neo4j graphs in the real world - graph days d.c. - april 14, 2015
Neo4j
 
Graph based data models
Moumie Soulemane
 
Introduction to graph databases GraphDays
Neo4j
 
Intro to Neo4j Webinar
Neo4j
 
NoSQL Graph Databases - Why, When and Where
Eugene Hanikblum
 
Introduction to Graph databases and Neo4j (by Stefan Armbruster)
barcelonajug
 
Neo4j the Anti Crime Database
Neo4j
 
Graph db
Gagan Agrawal
 
Intro to Graphs and Neo4j
jexp
 
Family tree of data – provenance and neo4j
M. David Allen
 
RDBMS to Graphs
Neo4j
 
Democratizing Data at Airbnb
Neo4j
 
Introducing Neo4j
Neo4j
 
An Introduction to NOSQL, Graph Databases and Neo4j
Debanjan Mahata
 
Intro to Neo4j and Graph Databases
Neo4j
 
GraphTalks - Einführung in Graphdatenbanken
Neo4j
 
Neo4J : Introduction to Graph Database
Mindfire Solutions
 
Graphdatenbank Neo4j: Konzept, Positionierung, Status Region DACH - Bruno Un...
Neo4j
 
Relational to Big Graph
Neo4j
 
TehranDB Meet-up April 2018 Introduction to Graph Database
Hamoon Mohammadian Pour
 

Viewers also liked (20)

PPTX
Big data
Atulya khobragade
 
PPTX
AppStore SEO
MobileMoxie
 
PPTX
Iain Bennett DCMS - 13 04 30 ultra connected cities seminar
Independent Networks Co-operative Association
 
PPTX
Rob Hamlin - CityFibre Holdings inca ultra connected cities - gigabit cities ...
Independent Networks Co-operative Association
 
PPTX
Research project presentation for Managing Global Sourcing
nipunhanda
 
PDF
The Impact of Machine Learning on Digital Commerce
Allan MacGregor
 
PPTX
Discovery of ranking fraud for mobile apps
Nagamalleswararao Tadikonda
 
PDF
Sensing WiFi Network for Personal IoT Analytics
Fahim Kawsar
 
PPT
Stephen Hilton - ND2012 Day 1, Plenary 2: Super-connected Cities
GoONND2012
 
DOCX
Discovery of ranking fraud for mobile apps
Nexgen Technology
 
PPT
12.07.2012 T8 Connected Cities, Daniela Krautsack (Cows in Jackets) & Joanna ...
Werbeplanung.at Summit
 
PDF
"Blockchains for AI", Trent McConaghy, AI researcher, blockchain engineer. Fo...
Dataconomy Media
 
PPTX
Oliver Scheer, Technical Evangelist at Microsoft, "SQL Azure, Power BI (embed...
Dataconomy Media
 
PPT
Smart Connected Cities Cisco Vision & Perspective by Ravinder Pal Singh
IPPAI
 
PDF
PERFORMIX.Wien 2016 – Search ohnne Keywords – Viktor Zemann (traffic3)
Werbeplanung.at Summit
 
PDF
Smart Cities UK 2016
4 All of Us
 
PPTX
Connected Retail: Running the Store with IoT
MIT Enterprise Forum Cambridge
 
PPTX
Hacking health: IoT, analytics and other trends
Jim Boland
 
PPTX
Sören Eickhoff, Informatica GmbH, "Informatica Intelligent Data Lake – Self S...
Dataconomy Media
 
PPTX
Mobile security issues & frauds in India
Yogesh Lolge
 
AppStore SEO
MobileMoxie
 
Iain Bennett DCMS - 13 04 30 ultra connected cities seminar
Independent Networks Co-operative Association
 
Rob Hamlin - CityFibre Holdings inca ultra connected cities - gigabit cities ...
Independent Networks Co-operative Association
 
Research project presentation for Managing Global Sourcing
nipunhanda
 
The Impact of Machine Learning on Digital Commerce
Allan MacGregor
 
Discovery of ranking fraud for mobile apps
Nagamalleswararao Tadikonda
 
Sensing WiFi Network for Personal IoT Analytics
Fahim Kawsar
 
Stephen Hilton - ND2012 Day 1, Plenary 2: Super-connected Cities
GoONND2012
 
Discovery of ranking fraud for mobile apps
Nexgen Technology
 
12.07.2012 T8 Connected Cities, Daniela Krautsack (Cows in Jackets) & Joanna ...
Werbeplanung.at Summit
 
"Blockchains for AI", Trent McConaghy, AI researcher, blockchain engineer. Fo...
Dataconomy Media
 
Oliver Scheer, Technical Evangelist at Microsoft, "SQL Azure, Power BI (embed...
Dataconomy Media
 
Smart Connected Cities Cisco Vision & Perspective by Ravinder Pal Singh
IPPAI
 
PERFORMIX.Wien 2016 – Search ohnne Keywords – Viktor Zemann (traffic3)
Werbeplanung.at Summit
 
Smart Cities UK 2016
4 All of Us
 
Connected Retail: Running the Store with IoT
MIT Enterprise Forum Cambridge
 
Hacking health: IoT, analytics and other trends
Jim Boland
 
Sören Eickhoff, Informatica GmbH, "Informatica Intelligent Data Lake – Self S...
Dataconomy Media
 
Mobile security issues & frauds in India
Yogesh Lolge
 
Ad

Similar to Bigdata and ai in p2 p industry: Knowledge graph and inference (20)

PDF
Edmc use cases 2018 nyc
Marty Loughlin
 
PDF
Big Data in FinTech
Mahmoud Jalajel
 
PDF
Introduction to Knowledge Graphs: Data Summit 2020
Enterprise Knowledge
 
PPTX
Using Graph Analysis and Fraud Detection in the Fintech Industry
Stanka Dalekova
 
PPTX
Using Graph Analysis and Fraud Detection in the Fintech Industry
Stanka Dalekova
 
PPTX
Tools and Methods for Big Data Analytics by Dahl Winters
Melinda Thielbar
 
PPTX
Tools and Methods for Big Data Analytics by Dahl Winters
Melinda Thielbar
 
PDF
Introduction to Knowledge Graphs and Semantic AI
Semantic Web Company
 
PPTX
Cognitive data
Sören Auer
 
PDF
Nasscom how can you identify fraud in fintech lending using deep learning
Ratnakar Pandey
 
PDF
Neo4j GraphDay Seattle- Sept19- graphs are ai
Neo4j
 
PPTX
Social job search
GiulianoVesci
 
PPTX
Follow the money with graphs
Stanka Dalekova
 
PDF
GraphTour London 2020 - Graphs for AI, Amy Hodler
Neo4j
 
PDF
ICPSR - Complex Systems Models in the Social Sciences - Lecture 6 - Professor...
Daniel Katz
 
PDF
Advanced Analytics: Graph Database Use Cases
DATAVERSITY
 
PDF
Graphs in the Real World
Neo4j
 
PDF
Knowledge Graphs, Ontologies, and AI Applications
Earley Information Science
 
PDF
Intro to ai application emeritus uob-final
Luis Fernando Gonzalez Sanchez
 
PDF
How Graphs Enhance AI
Neo4j
 
Edmc use cases 2018 nyc
Marty Loughlin
 
Big Data in FinTech
Mahmoud Jalajel
 
Introduction to Knowledge Graphs: Data Summit 2020
Enterprise Knowledge
 
Using Graph Analysis and Fraud Detection in the Fintech Industry
Stanka Dalekova
 
Using Graph Analysis and Fraud Detection in the Fintech Industry
Stanka Dalekova
 
Tools and Methods for Big Data Analytics by Dahl Winters
Melinda Thielbar
 
Tools and Methods for Big Data Analytics by Dahl Winters
Melinda Thielbar
 
Introduction to Knowledge Graphs and Semantic AI
Semantic Web Company
 
Cognitive data
Sören Auer
 
Nasscom how can you identify fraud in fintech lending using deep learning
Ratnakar Pandey
 
Neo4j GraphDay Seattle- Sept19- graphs are ai
Neo4j
 
Social job search
GiulianoVesci
 
Follow the money with graphs
Stanka Dalekova
 
GraphTour London 2020 - Graphs for AI, Amy Hodler
Neo4j
 
ICPSR - Complex Systems Models in the Social Sciences - Lecture 6 - Professor...
Daniel Katz
 
Advanced Analytics: Graph Database Use Cases
DATAVERSITY
 
Graphs in the Real World
Neo4j
 
Knowledge Graphs, Ontologies, and AI Applications
Earley Information Science
 
Intro to ai application emeritus uob-final
Luis Fernando Gonzalez Sanchez
 
How Graphs Enhance AI
Neo4j
 
Ad

Recently uploaded (20)

PDF
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
PDF
Mastering Financial Management in Direct Selling
Epixel MLM Software
 
PDF
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
PDF
CIFDAQ Market Wrap for the week of 4th July 2025
CIFDAQ
 
PDF
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
PPTX
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
DOCX
Cryptography Quiz: test your knowledge of this important security concept.
Rajni Bhardwaj Grover
 
PDF
What Makes Contify’s News API Stand Out: Key Features at a Glance
Contify
 
PDF
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PPTX
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
PDF
Transforming Utility Networks: Large-scale Data Migrations with FME
Safe Software
 
PPTX
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
PDF
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
PDF
CIFDAQ Market Insights for July 7th 2025
CIFDAQ
 
PDF
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
PDF
LOOPS in C Programming Language - Technology
RishabhDwivedi43
 
PPTX
COMPARISON OF RASTER ANALYSIS TOOLS OF QGIS AND ARCGIS
Sharanya Sarkar
 
PPTX
The Project Compass - GDG on Campus MSIT
dscmsitkol
 
PDF
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
PDF
Advancing WebDriver BiDi support in WebKit
Igalia
 
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
Mastering Financial Management in Direct Selling
Epixel MLM Software
 
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
CIFDAQ Market Wrap for the week of 4th July 2025
CIFDAQ
 
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
Cryptography Quiz: test your knowledge of this important security concept.
Rajni Bhardwaj Grover
 
What Makes Contify’s News API Stand Out: Key Features at a Glance
Contify
 
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
Transforming Utility Networks: Large-scale Data Migrations with FME
Safe Software
 
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
CIFDAQ Market Insights for July 7th 2025
CIFDAQ
 
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
LOOPS in C Programming Language - Technology
RishabhDwivedi43
 
COMPARISON OF RASTER ANALYSIS TOOLS OF QGIS AND ARCGIS
Sharanya Sarkar
 
The Project Compass - GDG on Campus MSIT
dscmsitkol
 
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
Advancing WebDriver BiDi support in WebKit
Igalia
 

Bigdata and ai in p2 p industry: Knowledge graph and inference

  • 1. Big Data and AI in P2P Industry Wenzhe Li [email protected] Feb 1, 2016
  • 2. Puhui Finance (www.puhuifinance.com) Services 爱钱 进 普惠 信贷 创新 资产 普惠 财富 • Internet Financing P2P company, headquarters in Beijing • Founded in July 2013 • $50M series A funding in Dec 2014 • ~5500 employees, 100+ offline stores Offline Financing Service Online Financing Service Online Lending Service Offline Lending Service
  • 3. Puhui Finance (cont.) Fastest growing p2p company. Big data technology is the key
  • 4. In this talk, I will mainly focus on the techniques used in lending side risk control. Similar techniques can be applied to the financing side. What the talk is about
  • 5. Outline • Why need Big data and AI • Intro to FC Engine and Knowledge Graph • Case 1: Anti-Fraud • Case 2: Lost Contact Recovery • Case 3: Detect Bad People via Search • More use cases • Challenges
  • 6. • Credit system is not mature in China • Targeting at under-served market, those who don’t have enough credit to borrow from bank • The data solely from credit history is not enough to build the scoring models • More efficient application reviewing process is needed as we move more transactions from offline to online Why big data & AI
  • 7. Outline • Why need Big data and AI • Intro to FC Engine and Knowledge Graph • Case 1: Anti-Fraud • Case 2: Lost Contact Recovery • Case 3: Detect Bad People via Search • More use cases • Challenges
  • 8. The central problem is risk control The solution is to use big data
  • 9. Measure the risk for a person Individual Feature Analysis Relation Analysis ? Knowledge Graph Feature Compute(FC) Engine
  • 10. • User explicitly input data (i.e. application form) • Authorized* user data • Mobile History • Purchasing History • …… • Open Search • Baidu.com • 360.com • Others (i.e. craigslist) • 3rd- party data (i.e. blacklist) Data Unstructured Data * User authorizes us to use their data
  • 11. Feature Compute Engine The goal is to convert unstructured data to structured features
  • 12. Feature Compute Engine Credit Card Mobile History Purchasing ...... Precision Marketing Fraud Score Risk Score FeatureCompute Engine Feature Container (tens of thousands) Data .... .... Data Credit Card History Mobile History Purchasing History Feature Compute Engine Data Scoring Model
  • 13. Purchasing History i.e. Purchasing History Total amount spent during the last 6 months User level (i.e. Prime, Normal…) Total number of transactions during the last 6 months The length of time he/she uses the account Total number of transactions related to virtual products Total number of transactions related to luxury products ……… Few thousand features
  • 14. • It is a semantic network • Based on graph data structure, consists of points and edges. Point represents entity, edge represents relationship. • Knowledge graph connects heterogeneous information. It provides the ability to analyze the data from the perspective of relationship. What is knowledge graph
  • 16. Knowledge graph – search engine
  • 17. Knowledge graph – search engine
  • 18. Knowledge graph – recommendation [1]
  • 19. Storing Knowledge graph Ranking DBMS 21 Neo4j (Graph Database) 32 MarkLogic (XML) 42 Titan (Graph Database) 46 OrientDB (Graph Database) 61 Virtuoso (RDF) 80 Jena (RDF) 88 Sesmae (RDF) 90 ArangoDB (GraphDatabase) 120 AllegroGraph (RDF) Trends for different types of database [2] Graph/RDF database ranking [3]
  • 20. • Logic-based approach • Probabilistic approach (i.e. distributed representation) • Hybrid approach Key techniques for knowledge graph Link Prediction
  • 21. Simple Approach: Pre-define some rules i.e. (Peter FatherOf Tom) -> (Tom SonOf Peter) (Peter ColleagueOf Tom), (Sarah ColleagueOf Peter) -> (Peter ColleaugeOf Sarah) Logic-based approach
  • 22. Methods based on distributed representation • Translating Embedding [4] • Tensor Factorization (RESCAL) Hybrid approach [5] • Neural Tensor Network (NTN) [6]
  • 23. Hybrid Approach – Logic + Probabilistic Simple Approach: 1. Generating all the new links using pre-define rules 2. Apply Statistical Learning Advanced Approach (i.e.): • Incorporation of Rules into Embeddings [7] • Injecting Logical Background [8]
  • 25. Connects person, phone, address, email, company…… Domain-specific knowledge graph
  • 26.  10 types of entities  ~50 types of relations  ~50M entities  0.2B relations We expect that it will become ~20 times bigger by the end of this year due to the business growth Domain-specific knowledge graph
  • 27. Outline • Why need Big data and AI • Intro to FC Engine and Knowledge Graph • Case 1: Anti-Fraud • Case 2: Lost Contact Recovery • Case 3: Detect Bad People via Search • More use cases • Challenges
  • 28. Applicant shares the same personal phone with other applicant Phone Applicant Other applicant Personal Phone Personal Phone Antifraud - rules
  • 29. Applicant and other applicant share the same colleague phone, but with different company names Phone Applicant Other applicant Colleague phone Company 1 Company 2 Colleague phone Antifraud – rules (cont.)
  • 30. Phone Applicant Personal phone Phone Phone Phone Phone Phone Overdue Overdue Some of the applicant’s contacts didn’t pay back the loan on time Antifraud – rules (cont.)
  • 31. Person 2 Person 1 Triangle relationship Person 3 Antifraud – cycle detection
  • 32. Applicant Applicant 2 Parent of Parent of Applicant 1 Spouse Inconsistent relations Antifraud – inconsistent relationship
  • 33. Antifraud – suspicious group Person 2 Person 1 Person 3 Share a lot of common attributes
  • 34. Knowledge Graph Visualization • Visualize entities and relationships • Design anti-fraud rules via observational study Antifraud – design by observation
  • 35. Rapid change of relationship structure within short time period Antifraud – evolution of graph structure
  • 36. LR Decision Tree Random Forest SVM ANN Models Prediction Extracted Features from Raw Data Results from anti-fraud rules User direct attributes Variables DNN Score is used to directly reject or accept the loan Antifraud – fraud score score
  • 37. Outline • Why need Big data and AI • Intro to FC Engine and Knowledge Graph • Case 1: Anti-Fraud • Case 2: Lost Contact Recovery • Case 3: Detect Bad People via Search • More use cases • Challenges
  • 38. The borrowers disappear, all the contact information they explicitly provided become invalid. How to reach them? Lost contact recovery – what is it Implicitly infer potential contact information
  • 39. Phone Applicant Personal phone Phone Phone Phone Phone Phone Rank the phone numbers, and predict relationship Building phone network – 1st order extension
  • 40. Building phone network – 2nd order extension Phone Applicant Personal phone Phone Phone Phone Phone Phone Phone Phone Phone Phone Phone Rank the phone numbers, and predict relationship
  • 41. 3rd order .. Phone Applicant Personal phone Phone Phone Phone Phone Phone Phone Phone Phone Phone Phone Phone Phone
  • 42. Simple Ranking Criteria • The total length of time • The frequency of calls Advanced Approach • Learning the ranking score using machine learning approach Building phone network – Rank
  • 43. • Total # of times of calling • Total length of time of calling • Total # of times of being called • Total # of times of calling • Average time per call • Maximum length of time • # of times of calling between 0-4am • # of times of calling between 4-8am • …… Building phone network – Predict the relation LR Decision Tree Random Forest SVM ANN Models Prediction of relation ~100 Features DNN Relation With very limited training data, our model provides ~30% accuracy
  • 44. Person Applicant Personal phone Person Other applicant knows? Other approach – Link prediction (on-going work) Link Prediction
  • 45. Outline • Why need Big data and AI • Intro to FC Engine and Knowledge Graph • Case 1: Anti-Fraud • Case 2: Lost Contact Recovery • Case 3: Detect Bad People via Search • More use cases • Challenges
  • 46. Detect Bad People via Search From the search results, we label each entities in the knowledge graph i.e. black, green etc.
  • 47. • Baidu.com • 360.com • other public websites Search for basic information…. • Phone number • Email • QQ • Other IDs Search Fields Search Engines & Public Site
  • 48. Search for phone number…
  • 50. • Clustering analysis • Precision marketing • …… Other Applications we are working on
  • 51. Outline • Why need Big data and AI • Intro to FC Engine and Knowledge Graph • Case 1: Anti-Fraud • Case 2: Lost Contact Recovery • Case 3: Detect Bad People via Search • More use cases • Challenges
  • 52. Challenges : Unstructured Data Unstructured Data Images Text AudioVideo Machine Learning Natural Language Processing Data Mining
  • 53. Challenges : Name Disambiguation Applicant Other applicant Puhui Finance Ltd. Puhui Finance Same company, can we merge? It is a very important problem to deal with!
  • 54. Challenges : Reasoning However, It is still an open problem • Logic-based approach • Probabilistic approach (i.e. distributed representation) • Hybrid approach Link Prediction
  • 55. Challenges : Insufficient Samples Big data, but small samples
  • 56. • Senior/Lead Machine Learning/NLP Engineers • Senior/Lead Data Engineer/Scientist • Senior/Lead Architect • Senior/Lead Software Engineer [email protected] [email protected] We are hiring! (in Beijing) Open positions, but not limited to…. Contact Company Website www.puhuifinance.com
  • 58. [1] http://www.datapop.com/ [2] http://db-engines.com/en/blog_post//43 [3] http://db-engines.com/en/ranking [4] Bordes, Antoine, et al. "Translating Embeddings for Modeling Multi- relational Data." Advances in Neural Information Processing Systems(2013):2787-2795. [5] Nickel, Maximilian, V. Tresp, and H. P. Kriegel. "A Three-Way Model for Collective Learning on Multi-Relational Data.." International Conference on Machine Learning 2011:809-816. References
  • 59. [6] Richard Socher, Danqi Chen, Christopher D. Manning, Andrew Ng. Reasoning With Neural Tensor Networks for Knowledge Base Completion. Advances in Neural Information Processing Systems(2013) [7] Wang, Quan, Wang, Bin, and Guo, Li. "Knowledge base completion using embeddings and rules." Proceedings of the 24th International Conference on Artificial Intelligence AAAI Press, 2015. [8] T Rocktäschel,S Singh,S Riedel. Injecting Logical Background Knowledge into Embeddings for Relation Extraction http://talks.cam.ac.uk/talk/index/58360 References