Tagged articles
163 articles
Page 2 of 2
DataFunSummit
DataFunSummit
Sep 19, 2021 · Artificial Intelligence

Graph Computing for Risk Control in WeChat Pay: From Feature Engineering to Network Analysis

This talk explains how WeChat Pay leverages graph algorithms, graph databases, and graph neural networks to combat fraud at massive scale, covering new risk‑control perspectives, the three‑pillar graph computing platform, practical applications, and the team’s innovations in algorithm design and deployment.

Graph Neural NetworkWeChat Paygraph computing
0 likes · 18 min read
Graph Computing for Risk Control in WeChat Pay: From Feature Engineering to Network Analysis
DataFunTalk
DataFunTalk
Sep 18, 2021 · Artificial Intelligence

Unsupervised Algorithms for Fraud Detection in Huya's Risk Control System

This article presents Huya's exploration of unsupervised learning techniques for risk control, detailing business risk scenarios, black‑market attack vectors, limitations of traditional defenses, and the design, implementation, and evaluation of graph‑based and density‑based clustering methods to automatically discover and mitigate fraudulent user groups.

AIHuyaUnsupervised Learning
0 likes · 11 min read
Unsupervised Algorithms for Fraud Detection in Huya's Risk Control System
DataFunSummit
DataFunSummit
Sep 15, 2021 · Information Security

Intelligent Risk Control in Live Streaming: Algorithm Architecture and Practice at Douyu

This article presents Douyu's intelligent risk‑control system for live streaming, detailing the security challenges, a multi‑layer algorithm architecture covering content, user‑behavior, gang and device risks, the evolution of models for spam detection, risk scoring, gang identification, sequence analysis, and device fingerprinting, and discusses practical solutions and interpretability techniques.

AISecurityfraud detection
0 likes · 12 min read
Intelligent Risk Control in Live Streaming: Algorithm Architecture and Practice at Douyu
DataFunTalk
DataFunTalk
Sep 9, 2021 · Artificial Intelligence

Evolution and Architecture of a Financial Risk Control System: From Monolith to Microservices and Commercialization

This article details the design, refactoring, performance optimization, reliability monitoring, and commercialization of a financial risk control system, covering rule abstraction, decision workflows, feature engineering, model integration, and the trade‑offs between latency and accuracy in large‑scale production environments.

System Architecturedecision enginefeature engineering
0 likes · 15 min read
Evolution and Architecture of a Financial Risk Control System: From Monolith to Microservices and Commercialization
DataFunTalk
DataFunTalk
Sep 7, 2021 · Artificial Intelligence

Intelligent Risk Control Practices and Architecture at Shumei Technology

This article presents Shumei Technology's comprehensive intelligent risk control solution, detailing the fraud landscape, challenges, a full-stack architecture—including device, behavior, and group detection, profiling, operational workflows, AI models, and real-time deployment—along with practical case studies in banking and live‑streaming platforms.

AIfraud detectionreal-time architecture
0 likes · 25 min read
Intelligent Risk Control Practices and Architecture at Shumei Technology
Qu Tech
Qu Tech
Aug 23, 2021 · Information Security

How Qutoutiao Built a Robust Anti-Cheat SDK and Device Fingerprinting System

This article outlines Qutoutiao's security team's development of a standalone anti‑cheat SDK, its custom device‑fingerprinting architecture, the evolution of their fingerprint algorithms, the creation of the tuid identifier, and how these technologies together combat black‑market attacks while maintaining compliance and stability.

Mobile SecuritySDKanti-cheat
0 likes · 18 min read
How Qutoutiao Built a Robust Anti-Cheat SDK and Device Fingerprinting System
DataFunTalk
DataFunTalk
Aug 19, 2021 · Artificial Intelligence

Graph Computing for Risk Control in WeChat Pay: Platforms, Algorithms, and Practices

This talk presents how WeChat Pay leverages graph computing, including graph databases, engines, and algorithms such as GNN and PageRank, to combat fraud and money‑laundering by shifting from individual feature engineering to network‑level analysis, highlighting platform choices, practical experiences, and technology‑for‑good outcomes.

GNNWeChat Payfraud detection
0 likes · 16 min read
Graph Computing for Risk Control in WeChat Pay: Platforms, Algorithms, and Practices
DataFunTalk
DataFunTalk
Aug 16, 2021 · Artificial Intelligence

Intelligent Risk Control in Live Streaming: Architecture, Challenges, and Model Evolution at Douyu

This article presents Douyu's intelligent risk‑control system for live streaming, detailing the operational, activity, traffic, account, transaction and content safety challenges, the multi‑layer algorithm architecture, and the evolution of models for spam detection, risk scoring, gang identification, behavior sequencing, device fingerprinting, and interpretability.

Model architectureartificial intelligencefraud detection
0 likes · 13 min read
Intelligent Risk Control in Live Streaming: Architecture, Challenges, and Model Evolution at Douyu
DataFunTalk
DataFunTalk
Jul 23, 2021 · Artificial Intelligence

Ad Fraud Detection and Risk Control Practices at Alibaba Mama

This article explains Alibaba Mama's ad fraud risk control workflow, defines invalid traffic types, describes perception, insight, and disposal mechanisms, and outlines the AI‑driven detection models, evaluation metrics, and future research directions for large‑scale advertising security.

Ad FraudAlibabaanomaly detection
0 likes · 14 min read
Ad Fraud Detection and Risk Control Practices at Alibaba Mama
Alimama Tech
Alimama Tech
Jul 21, 2021 · Artificial Intelligence

Ad Fraud Detection and Risk Control Practices at Alibaba Mama

Alibaba Mama combats the roughly 8.6 % abnormal traffic in China’s online ad market by distinguishing low‑quality from cheating clicks, employing a proactive perception layer, high‑dimensional visual analytics, and a dual‑stage real‑time and batch filtering system that also freezes fraudulent affiliate commissions and is continuously evaluated with precision‑recall and AUC metrics.

Alibabaad fraud detectionanomaly detection
0 likes · 15 min read
Ad Fraud Detection and Risk Control Practices at Alibaba Mama
DataFunTalk
DataFunTalk
Jul 6, 2021 · Artificial Intelligence

Automated End-to-End Model Iteration in Intelligent Risk Control Systems

This article explains how an intelligent risk control system can achieve fully automated, end-to-end model iteration, detailing the multi-layer architecture, sample and feature selection, automated training, evaluation, scoring, deployment, and the efficiency gains compared with manual processes.

AIModel Evaluationfeature engineering
0 likes · 20 min read
Automated End-to-End Model Iteration in Intelligent Risk Control Systems
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Jul 1, 2021 · Operations

Inside JD.com’s Order Transfer and Fulfillment Workflow

This article explains JD.com’s comprehensive order transfer, inventory management, fulfillment workflow, and risk‑control mechanisms, illustrating how orders are allocated to warehouses, scheduled for production, and monitored to ensure efficient e‑commerce operations.

E‑commerce Operationsinventory managementorder fulfillment
0 likes · 10 min read
Inside JD.com’s Order Transfer and Fulfillment Workflow
DataFunTalk
DataFunTalk
Jun 23, 2021 · Artificial Intelligence

Graph Algorithm Practices for Anti‑Cheat on the Douyu Live‑Streaming Platform

This article explains how Douyu uses graph‑based algorithms to detect and mitigate fraudulent streaming traffic, covering the platform's risk‑control scenarios, the overall graph architecture, its evolution, modeling workflow, practical case studies, and the resulting improvements in detection accuracy and interpretability.

anti-cheatgraph algorithmsgraph embedding
0 likes · 16 min read
Graph Algorithm Practices for Anti‑Cheat on the Douyu Live‑Streaming Platform
DataFunTalk
DataFunTalk
Jun 7, 2021 · Information Security

Anti‑Fraud Strategies and Practices for the Jimu Social App

This article presents Xu Ming, head of risk control at Jimu, sharing comprehensive insights and practical experiences on combating black‑gray market fraud within the Jimu app, covering the platform’s risk points, common challenges, overall anti‑fraud strategy, detailed operational tactics, and reflective thoughts on future improvements.

App Securityanti‑fraudblack market
0 likes · 17 min read
Anti‑Fraud Strategies and Practices for the Jimu Social App
DataFunSummit
DataFunSummit
Feb 25, 2021 · Information Security

Intelligent Risk Control at 58.com: Architecture, Challenges, and Unknown‑Risk Detection

This article introduces the business background and security challenges of 58.com, explains the three‑layer intelligent risk‑control architecture built on big‑data and AI, and details practical methods for perceiving and detecting unknown risks using techniques such as PU learning, Prophet, and HotSpot.

AIalgorithminformation security
0 likes · 14 min read
Intelligent Risk Control at 58.com: Architecture, Challenges, and Unknown‑Risk Detection
The Dominant Programmer
The Dominant Programmer
Jan 7, 2021 · R&D Management

Core Project Risk Management Knowledge Map

This article presents a visual mind map that outlines the essential knowledge points of project risk management, covering overview, planning, risk identification, qualitative and quantitative analysis, response planning, and risk control.

project risk managementqualitative risk analysisquantitative risk analysis
0 likes · 2 min read
Core Project Risk Management Knowledge Map
DataFunSummit
DataFunSummit
Dec 24, 2020 · Information Security

Evolution and Architecture of Risk Control at 58.com

This article outlines the development stages, architectural evolution, and practical challenges of 58.com’s risk‑control platform, describing how the system progressed from manual review to configurable automation, multi‑scene governance, and intelligent expert‑driven auditing to protect billions of daily transactions.

fraud detectioninformation securityplatform architecture
0 likes · 10 min read
Evolution and Architecture of Risk Control at 58.com
Qunar Tech Salon
Qunar Tech Salon
Dec 24, 2020 · Frontend Development

Design and Implementation of a Component Management System for Large‑Scale Marketing Pages at Qunar

This article describes how Qunar built a Component Management System (CMS) that enables reusable, configurable marketing pages across app, H5 and mini‑programs, detailing the business needs, architectural decisions, multi‑end rendering, risk controls, operational workflow, and the resulting cost and experience benefits.

Component ManagementMarketing Automationlow-code
0 likes · 11 min read
Design and Implementation of a Component Management System for Large‑Scale Marketing Pages at Qunar
JD Tech Talk
JD Tech Talk
Dec 9, 2020 · Information Security

Understanding “Wool Party” Attacks: Interface and Business Layer Threats in Marketing Scenarios

This article explains how the so‑called “wool party” (羊毛党) operates in marketing environments, detailing common interface‑layer attacks, business‑layer (UI) attacks, the tools they use such as card‑issuing and SMS‑receiving platforms, and the defensive measures employed by intelligent risk‑control systems.

business layer attackinformation securityinterface attack
0 likes · 7 min read
Understanding “Wool Party” Attacks: Interface and Business Layer Threats in Marketing Scenarios
58 Tech
58 Tech
Aug 24, 2020 · Big Data

Design and Practice of an Online Real-Time Feature System for Intelligent Risk Control

This article presents the concepts, architecture, and practical techniques of an online real‑time feature system used in intelligent risk‑control, covering feature definition, time‑window types, calculation functions, distributed processing, low‑latency storage, and operational challenges in high‑concurrency environments.

Big DataReal-time ProcessingStreaming
0 likes · 16 min read
Design and Practice of an Online Real-Time Feature System for Intelligent Risk Control
Huolala Tech
Huolala Tech
Jun 30, 2020 · Operations

How Robust Risk Admission Strategies Power Platform Safety and Growth

This article explains the design and implementation of a comprehensive risk‑control admission framework—including authentication, eligibility rules, pipeline processing, and AI‑driven verification—that safeguards platform operations while enabling scalable growth and efficient order management.

AI verificationSystem Architectureadmission strategy
0 likes · 10 min read
How Robust Risk Admission Strategies Power Platform Safety and Growth
Mafengwo Technology
Mafengwo Technology
Feb 20, 2020 · R&D Management

How a Custom PMO System Boosts Development Efficiency and Cuts Management Costs

This article explains how the MaFengWo PMO team built a self‑developed PMO system that centralizes requirement data, automates group creation, synchronizes messages and emails, provides risk alerts and weekly reports, ultimately improving execution speed, reducing manual effort, and supporting multi‑business‑line project management.

Data AnalyticsPMOProject Management
0 likes · 16 min read
How a Custom PMO System Boosts Development Efficiency and Cuts Management Costs
37 Interactive Technology Team
37 Interactive Technology Team
Feb 20, 2020 · Artificial Intelligence

Risk Control System for Detecting Game Account Fraud Using Feature Engineering and Graph Database

The article describes a risk‑control pipeline for detecting high‑volume fraudulent game accounts, detailing data collection from game logs, extensive feature engineering and statistical tests, enrichment via a Neo4j knowledge graph, and a hybrid RandomForest‑GBDT model combined with methods to filter personal accounts.

Neo4jdata miningfeature engineering
0 likes · 8 min read
Risk Control System for Detecting Game Account Fraud Using Feature Engineering and Graph Database
DataFunTalk
DataFunTalk
Feb 12, 2020 · Artificial Intelligence

Beike's Risk Control System: Leveraging Knowledge Graphs and Graph Analytics

The article details how Beike's Agent Cooperation Network employs a multi‑layered risk control framework built on large‑scale knowledge graphs, graph mining, and machine‑learning techniques to detect fake listings, malicious competition, and other threats across both online and offline real‑estate scenarios.

Knowledge Graphgraph analyticsmachine learning
0 likes · 10 min read
Beike's Risk Control System: Leveraging Knowledge Graphs and Graph Analytics
Programmer DD
Programmer DD
Dec 11, 2019 · Big Data

Big Data Architecture Secrets: Storage-Compute Separation & Spark in Action

This article explores how enterprises can tackle the explosive growth of data by adopting modern big‑data architectures, including storage‑compute separation, data‑driven workflows, risk‑control frameworks, and real‑world Spark optimizations, offering practical guidance for scalable, high‑performance analytics.

Big DataData ArchitectureData-driven
0 likes · 12 min read
Big Data Architecture Secrets: Storage-Compute Separation & Spark in Action
UCloud Tech
UCloud Tech
Dec 4, 2019 · Big Data

How to Evolve Big Data Architectures for ZB‑Scale Analytics and Real‑World Use Cases

This article reviews the challenges of handling Zettabyte‑scale data, outlines practical big‑data processing architectures, discusses storage‑compute separation, data‑driven workflows, risk‑control frameworks, and shares concrete Spark implementations at MobTech, offering actionable insights for modern data engineers.

Data ArchitectureSparkStorage Compute Separation
0 likes · 13 min read
How to Evolve Big Data Architectures for ZB‑Scale Analytics and Real‑World Use Cases
Tencent Cloud Developer
Tencent Cloud Developer
Nov 28, 2019 · Information Security

E‑commerce Marketing Risk Control: Strategies to Counter Black‑Grey Market Attacks Using Big Data and AI

Tencent’s Tianyu platform uses big‑data pipelines and AI‑driven behavior analysis to detect and block sophisticated black‑grey market attacks—real‑person wool‑pullers, automated captcha solving, and coupon‑grabbing—protecting e‑commerce giants during events like Double 12, saving billions in marketing costs.

AIblack-grey markete-commerce security
0 likes · 16 min read
E‑commerce Marketing Risk Control: Strategies to Counter Black‑Grey Market Attacks Using Big Data and AI
Efficient Ops
Efficient Ops
Oct 17, 2019 · Operations

Unlocking the Core Value of Operations: How Risk Control Drives DevOps Success

The article explores the fundamental role of operations engineers in software lifecycle risk control, comparing their work to automotive maintenance, categorizing risks, and outlining strategies such as automation, standardization, and DevOps practices to enhance stability, efficiency, and long‑term value.

risk controlsoftware lifecycle
0 likes · 24 min read
Unlocking the Core Value of Operations: How Risk Control Drives DevOps Success
Suning Technology
Suning Technology
Aug 26, 2019 · Information Security

Inside Suning’s Fight Against Online Scalpers: How Tech Teams Cracked Coupon‑Snatching Software

The Suning technology risk‑control team teamed with Nanjing police to dismantle a sophisticated network‑scalper operation, revealing how custom coupon‑snatching software harms consumers and platforms, and showcasing advanced anti‑bot techniques such as emulator fingerprinting, captcha automation blocking, and data‑driven fraud models.

Fraud Preventionbot detectione-commerce security
0 likes · 5 min read
Inside Suning’s Fight Against Online Scalpers: How Tech Teams Cracked Coupon‑Snatching Software
Mafengwo Technology
Mafengwo Technology
Jul 25, 2019 · Backend Development

Revamping MaFengWo’s Membership Platform: Architecture, Identity & Performance

This article details how MaFengWo redesigned its membership system—introducing a SKU‑based identity model, a four‑layer service architecture, performance‑focused concurrency controls, and risk‑mitigation mechanisms—to support a richer, more flexible user experience in the post‑traffic‑bonus era.

Backend ArchitecturePerformance Optimizationidentity strategy
0 likes · 18 min read
Revamping MaFengWo’s Membership Platform: Architecture, Identity & Performance
21CTO
21CTO
Jul 6, 2019 · Information Security

How to Secure Mobile Web Campaign Pages Against Bot Attacks

This article examines the security challenges of mobile web marketing pages, explains how bot-driven API abuse harms users and businesses, and presents a comprehensive solution involving front‑end behavior tracking, risk‑control services, token‑based HTTPS communication, data encryption, and JavaScript obfuscation to protect against automated attacks.

Web Securitydata encryptionhuman verification
0 likes · 16 min read
How to Secure Mobile Web Campaign Pages Against Bot Attacks
JD Retail Technology
JD Retail Technology
Jun 15, 2019 · Information Security

Risk Control Department's 618 Shopping Festival Preparation

The Risk Control Department's 618 shopping festival preparation involves comprehensive planning, system capacity expansion, and 24/7 monitoring to ensure stable operations and combat fraud during the high-traffic shopping event.

24/7 monitoringFraud Preventioncapacity expansion
0 likes · 3 min read
Risk Control Department's 618 Shopping Festival Preparation
21CTO
21CTO
Jun 5, 2019 · Information Security

How to Secure Mobile Web Activity Pages: Human Verification, Tokens, and Code Obfuscation

This article explains the security challenges of mobile web activity pages in e‑commerce, outlines a risk‑control workflow that includes human‑verification algorithms, token‑based communication protection, data encryption, and front‑end code obfuscation, and provides a step‑by‑step technical solution to mitigate abuse and improve user experience.

BackendWeb Securityhuman verification
0 likes · 16 min read
How to Secure Mobile Web Activity Pages: Human Verification, Tokens, and Code Obfuscation
iQIYI Technical Product Team
iQIYI Technical Product Team
May 17, 2019 · Artificial Intelligence

Kui: AI-Powered Anti-Spam System Architecture and Strategies

Kui is iQiyi’s AI‑driven anti‑spam platform that protects online communities through a three‑layer architecture—service, algorithm strategy, and auxiliary modules—and employs keyword, rule‑based, machine‑learning, and risk‑control strategies to detect advertising, pornographic, abusive and other malicious content while continuously adapting to evolving threats.

AI systemanti-spamcontent moderation
0 likes · 10 min read
Kui: AI-Powered Anti-Spam System Architecture and Strategies
58 Tech
58 Tech
May 16, 2019 · Information Security

Key Takeaways from the 58 Group Technical Salon on Account System Practices and Security

The 58 Group Technical Salon on April 23, 2019 presented a comprehensive overview of account system design, risk control, gateway authentication, multi‑active data synchronization, overseas account handling, cloud account platform capabilities, and security strategies, offering practical insights for building robust and secure user authentication infrastructures.

Securityaccount systemcloud account
0 likes · 10 min read
Key Takeaways from the 58 Group Technical Salon on Account System Practices and Security
Meituan Technology Team
Meituan Technology Team
Mar 7, 2019 · Information Security

Enhancing Security of Mobile Web Activity Pages: Human Verification and Risk Control Strategies

To protect mobile web activity pages such as coupons and lotteries, the article proposes a layered security approach that combines professional risk‑control services, custom human‑verification logs, token‑based HTTPS signing, data encryption, and aggressive front‑end JavaScript obfuscation to block automated abuse while preserving user experience.

TokenWeb Securityencryption
0 likes · 16 min read
Enhancing Security of Mobile Web Activity Pages: Human Verification and Risk Control Strategies
G7 EasyFlow Tech Circle
G7 EasyFlow Tech Circle
Jan 31, 2019 · Backend Development

How G7’s Financial Strategy Center Revolutionizes Risk Control with Unified Rule Management

The article explains how G7's Financial Strategy Center unifies risk‑control rules into a strategy platform, detailing its benefits, underlying architecture, rule‑engine processing steps, and the supporting indicator service that together streamline development, deployment, and management of complex financial risk policies.

Backend Architecturefinancial technologyrisk control
0 likes · 6 min read
How G7’s Financial Strategy Center Revolutionizes Risk Control with Unified Rule Management
DataFunTalk
DataFunTalk
Jan 30, 2019 · Artificial Intelligence

Real‑Time Metrics Processing Technology for Financial Risk Control and Anti‑Fraud

This article outlines the challenges of financial risk control in the internet era and presents a comprehensive real‑time metrics processing system, covering data leakage, fraud, big‑data opportunities, AI model deployment, and the technical architecture of the Bangsheng real‑time indicator platform.

AIBig Dataanti‑fraud
0 likes · 17 min read
Real‑Time Metrics Processing Technology for Financial Risk Control and Anti‑Fraud
DataFunTalk
DataFunTalk
Jan 21, 2019 · Artificial Intelligence

Applying Automated Feature Engineering and Auto Modeling to Risk Control Scenarios

This article explains how automated feature engineering and auto‑modeling techniques dramatically reduce development time and improve performance in fraud‑risk detection, detailing the underlying RFM concepts, feature generation workflow, model selection, evaluation, deployment, and continuous monitoring within a risk‑control platform.

auto modelingautomated feature engineeringfraud detection
0 likes · 14 min read
Applying Automated Feature Engineering and Auto Modeling to Risk Control Scenarios
转转QA
转转QA
Sep 12, 2018 · Information Security

Understanding Spam Prevention: Cheating Types and Anti‑Cheat Strategies in Zhuanzhuan's Risk Control System

The article explains Zhuanzhuan's risk‑control architecture, detailing content and behavior cheating types, three anti‑cheat approaches—strategy, product, and model—and practical interception, rule‑penalty mechanisms, and integration tips for developers and security engineers.

anti-cheatinformation securitymachine learning
0 likes · 9 min read
Understanding Spam Prevention: Cheating Types and Anti‑Cheat Strategies in Zhuanzhuan's Risk Control System
21CTO
21CTO
Sep 10, 2018 · Backend Development

How to Build a Scalable Live Video Streaming Architecture

This article outlines a complete live video streaming architecture, covering the end‑to‑end pipeline, adaptive bitrate handling, player implementation, SDK layer management, message flow, channel comparisons, heartbeat mechanisms, bucket allocation strategies, risk control for large promotions, and platformization challenges, illustrated with detailed diagrams.

BackendSDKVideo Architecture
0 likes · 2 min read
How to Build a Scalable Live Video Streaming Architecture
JD Tech
JD Tech
Jul 24, 2018 · Big Data

Quantitative Modeling, Strategy Design, and Collection Management in Consumer Finance Risk Control

This article explains how quantitative modeling, strategy design, and collection management form the core of risk control in consumer finance, detailing required theoretical knowledge, practical skills, and the importance of aligning models with business objectives while highlighting current industry practices.

big data modelingcollection managementquantitative models
0 likes · 9 min read
Quantitative Modeling, Strategy Design, and Collection Management in Consumer Finance Risk Control
AntTech
AntTech
Jun 15, 2018 · Artificial Intelligence

AutoPilot: AI‑Driven Unmanned Risk Control in Alipay’s AlphaRisk System

The article explains how Alipay’s AutoPilot module leverages AI, semi‑supervised and evolutionary algorithms to achieve autonomous, personalized risk‑control decisions, optimizing multi‑objective trade‑offs and dramatically improving fraud loss rates during high‑traffic events like the 2017 Double‑11 sale.

AIAlipayAutoPilot
0 likes · 7 min read
AutoPilot: AI‑Driven Unmanned Risk Control in Alipay’s AlphaRisk System
Tencent Cloud Developer
Tencent Cloud Developer
May 31, 2018 · Backend Development

Tencent Billing System (Mi Master): Architecture, Reliability, Security, and Global Capabilities

The Mi Master billing platform, a SaaS service from Tencent that processes over 735 billion RMB quarterly, provides a unified, modular architecture with distributed multi‑master databases, high‑availability cross‑region deployment, multi‑stage fraud detection, and global support for 80+ payment channels across 180+ countries, delivering seamless APIs, automated reconciliation, and extensive revenue‑sharing tools for products such as Honor of Kings, PUBG, WeChat Pay, and QQ Wallet.

Distributed SystemsReliabilitybilling architecture
0 likes · 19 min read
Tencent Billing System (Mi Master): Architecture, Reliability, Security, and Global Capabilities
Tencent Cloud Developer
Tencent Cloud Developer
Apr 23, 2018 · Industry Insights

How Tencent Cloud’s “Mi Master” Enables Scalable, Secure Mobile Payments

The article examines Tencent Cloud’s “Mi Master” payment platform, detailing its background, three‑tier system architecture, real‑time transaction consistency mechanisms, traffic‑scheduling strategies, scenario‑based stress testing, and multi‑dimensional risk‑control measures that together ensure high availability and security for large‑scale mobile payment services.

Payment ArchitectureScalabilitycloud computing
0 likes · 10 min read
How Tencent Cloud’s “Mi Master” Enables Scalable, Secure Mobile Payments
JD Retail Technology
JD Retail Technology
Dec 11, 2017 · Big Data

Data Model Component Management Platform: Functions and Practices

The presentation introduces JD's Data Model Component Management Platform, detailing its four core functions—risk control, effect evaluation, model fusion, and multi‑scenario application—while explaining how these capabilities improve model reliability, commercial value, and operational efficiency across numerous business products.

JDModel Fusiondata-model
0 likes · 8 min read
Data Model Component Management Platform: Functions and Practices
iQIYI Technical Product Team
iQIYI Technical Product Team
Nov 24, 2017 · Information Security

Risk Control System for Live Streaming: Real‑time Interception (Pluto) and Big Data Analysis (Mars)

iQIYI’s live‑stream risk‑control platform combines the real‑time interception engine Pluto with the big‑data analytics system Mars to curb black‑market registration fraud and red‑packet abuse, processing over a billion daily requests through adaptive filters, Kafka‑Spark pipelines, and clustering algorithms that now limit fake popularity to 10‑30 % and red‑packet capture to under 3 %.

Big DataMarsPluto
0 likes · 11 min read
Risk Control System for Live Streaming: Real‑time Interception (Pluto) and Big Data Analysis (Mars)
ITPUB
ITPUB
Nov 17, 2017 · Artificial Intelligence

How RNNs Power Risk Control in O2O Food Delivery: A TensorFlow Case Study

This article explains how Baidu Waimai's risk‑control team uses recurrent neural networks, especially LSTM, within TensorFlow to detect fraudulent merchants and users, compares static and dynamic RNN implementations, demonstrates a MNIST digit‑recognition example, and discusses optimization algorithms and model trade‑offs for real‑time fraud detection.

Deep LearningLSTMMNIST
0 likes · 27 min read
How RNNs Power Risk Control in O2O Food Delivery: A TensorFlow Case Study
iQIYI Technical Product Team
iQIYI Technical Product Team
Oct 13, 2017 · Industry Insights

How iQIYI Built a Cloud‑Native Risk Control Platform to Stop Credential Stuffing

iQIYI’s security cloud team designed a data‑driven, cloud‑native risk control platform that unifies threat detection, rule management, and security knowledge across membership, video, e‑commerce and payment services, achieving sub‑5 ms latency, 24 billion daily requests, and near‑complete elimination of machine credential‑stuffing attacks.

cloud securitydata-driven securityiQIYI
0 likes · 17 min read
How iQIYI Built a Cloud‑Native Risk Control Platform to Stop Credential Stuffing
Ctrip Technology
Ctrip Technology
Sep 27, 2017 · Information Security

Evolution and Architecture of Ctrip's Online Risk Control System (Aegis)

The article details the design, major revisions, and performance optimizations of Ctrip's online risk control platform, describing its shift from a .NET‑SQL Server monolith to a Java‑based modular architecture with custom TSDB, big‑data services, and distributed rule execution to handle billions of daily risk events.

JavaSystem Architecturereal-time fraud detection
0 likes · 9 min read
Evolution and Architecture of Ctrip's Online Risk Control System (Aegis)
AntTech
AntTech
Aug 4, 2017 · Artificial Intelligence

Key Insights from Ant Financial VP Dr. Qi Yuan’s Talk on the Development and Application of Financial Intelligence at CCAI 2017

The article summarizes Dr. Qi Yuan’s presentation at CCAI 2017, detailing Ant Financial’s AI‑driven solutions for financial services—including risk control, intelligent assistants, large‑scale machine learning, reinforcement‑learning marketing, a model‑service platform, and a computer‑vision damage‑assessment system—while highlighting technical challenges, platform architecture, and the company’s open‑tech philosophy.

FinTechartificial intelligencereinforcement learning
0 likes · 16 min read
Key Insights from Ant Financial VP Dr. Qi Yuan’s Talk on the Development and Application of Financial Intelligence at CCAI 2017
High Availability Architecture
High Availability Architecture
Jul 12, 2017 · Artificial Intelligence

Machine Learning Platform and Risk‑Control Applications at DianRong Net

The article presents a comprehensive overview of DianRong Net's in‑house machine‑learning platform built on Spark, its workflow, pain points it addresses, risk‑control case studies using graph mining, and practical tips for improving model performance through data, algorithms, hyper‑parameter tuning and ensemble methods.

Big DataModel OptimizationSpark
0 likes · 14 min read
Machine Learning Platform and Risk‑Control Applications at DianRong Net
Ctrip Technology
Ctrip Technology
Jul 6, 2017 · Big Data

Evolution of Ctrip's Data Platform: From Version 1.0 to 2.0 for Risk Control

This article describes how Ctrip's information security team redesigned its data platform from a simple RabbitMQ‑MySQL pipeline to a scalable, real‑time and offline big‑data architecture using Kafka, Storm, Hadoop, Spark, and a custom count server, dramatically improving processing capacity and supporting risk‑control operations.

CtripReal-time Processingrisk control
0 likes · 8 min read
Evolution of Ctrip's Data Platform: From Version 1.0 to 2.0 for Risk Control
Baidu Waimai Technology Team
Baidu Waimai Technology Team
Jun 27, 2017 · Artificial Intelligence

Detecting Low‑Quality New Users in Food Delivery with a GBDT + LR Model

The article describes a data‑driven approach for identifying low‑value new users in a food‑delivery platform by labeling 7‑day repeat‑purchase behavior, extracting order, behavior, merchant and user features, and training a combined Gradient Boosted Decision Tree and Logistic Regression model to improve fraud detection and merchant penalty decisions.

AIGBDTfeature engineering
0 likes · 7 min read
Detecting Low‑Quality New Users in Food Delivery with a GBDT + LR Model
Ctrip Technology
Ctrip Technology
Feb 16, 2017 · Backend Development

Designing a Payment Routing Mechanism: From Business Scenarios to Technical Implementation

The article explains how a payment routing system can be built to manage profitability, user experience, and success rates by combining guide routing and transaction routing, using real‑world analogies, strategy examples, and architectural diagrams to illustrate channel selection, risk control, and cost optimization.

BackendFinTechchannel selection
0 likes · 10 min read
Designing a Payment Routing Mechanism: From Business Scenarios to Technical Implementation
Ctrip Technology
Ctrip Technology
Dec 2, 2016 · Big Data

Design and Architecture of Ctrip's Aegis Risk Control System

This article presents a comprehensive overview of Ctrip's Aegis risk control system, detailing its modular architecture, rule engine, data service layer, Chloro analytics platform, and future directions, while highlighting the use of streaming, big‑data processing, and machine‑learning models for real‑time fraud detection.

Big DataReal-time Processingmachine learning
0 likes · 13 min read
Design and Architecture of Ctrip's Aegis Risk Control System
Qunar Tech Salon
Qunar Tech Salon
Jul 4, 2016 · Information Security

Xiaomi Risk Control Practices: Architecture, Rule Engine, and Machine Learning

Xiaomi senior R&D engineer Deng Wenjun shares the evolution of Xiaomi's internet‑finance risk‑control system, describing early rule‑based limits, the adoption of Drools for fast rule deployment, data‑driven modeling with random‑forest classifiers, and ongoing challenges in scalability, latency, and privacy.

DroolsRandom Forestfinancial technology
0 likes · 16 min read
Xiaomi Risk Control Practices: Architecture, Rule Engine, and Machine Learning
High Availability Architecture
High Availability Architecture
Jun 24, 2016 · Information Security

Xiaomi's Internet Finance Risk Control Practices: Architecture, Rules Engine, and Machine Learning

The article details Xiaomi's evolution of internet‑finance risk control—from early limit and frequency rules that cut bad‑debt by a third, through adopting the Drools rules engine for rapid deployment and gray‑release, to leveraging random‑forest machine‑learning models and extensive user profiling that reduced fraud by roughly 40%, while addressing privacy and operational challenges.

DroolsRandom ForestSecurity
0 likes · 15 min read
Xiaomi's Internet Finance Risk Control Practices: Architecture, Rules Engine, and Machine Learning
21CTO
21CTO
May 16, 2016 · Information Security

Building a Scalable Payment Risk Control System: Architecture & CEP

This article outlines the design of a payment risk control system, detailing functional and non‑functional requirements, core components such as real‑time, near‑real‑time, and batch engines, rule and penalty centers, and explains the role of CEP and Drools in achieving flexible, high‑performance fraud detection.

CEPDroolsReal-time Processing
0 likes · 12 min read
Building a Scalable Payment Risk Control System: Architecture & CEP
Architecture Digest
Architecture Digest
May 15, 2016 · Information Security

Design and Architecture of a Payment Risk Control System

The article explains the functional and non‑functional requirements, common pitfalls, and detailed architecture—including real‑time, near‑real‑time, and batch engines, rule and penalty centers, and CEP technology—of a payment risk control system aimed at detecting and mitigating fraud while maintaining performance and flexibility.

CEPReal-time ProcessingSystem Architecture
0 likes · 12 min read
Design and Architecture of a Payment Risk Control System