• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
高级检索

基于风险和剩余价值的在线P2P借贷投资推荐方法

朱梦莹, 郑小林, 王朝晖

朱梦莹, 郑小林, 王朝晖. 基于风险和剩余价值的在线P2P借贷投资推荐方法[J]. 计算机研究与发展, 2016, 53(12): 2708-2720. DOI: 10.7544/issn1000-1239.2016.20160608
引用本文: 朱梦莹, 郑小林, 王朝晖. 基于风险和剩余价值的在线P2P借贷投资推荐方法[J]. 计算机研究与发展, 2016, 53(12): 2708-2720. DOI: 10.7544/issn1000-1239.2016.20160608
Zhu Mengying, Zheng Xiaolin, Wang Chaohui. Investment Recommendation Based on Risk and Surplus in P2P Lending[J]. Journal of Computer Research and Development, 2016, 53(12): 2708-2720. DOI: 10.7544/issn1000-1239.2016.20160608
Citation: Zhu Mengying, Zheng Xiaolin, Wang Chaohui. Investment Recommendation Based on Risk and Surplus in P2P Lending[J]. Journal of Computer Research and Development, 2016, 53(12): 2708-2720. DOI: 10.7544/issn1000-1239.2016.20160608
朱梦莹, 郑小林, 王朝晖. 基于风险和剩余价值的在线P2P借贷投资推荐方法[J]. 计算机研究与发展, 2016, 53(12): 2708-2720. CSTR: 32373.14.issn1000-1239.2016.20160608
引用本文: 朱梦莹, 郑小林, 王朝晖. 基于风险和剩余价值的在线P2P借贷投资推荐方法[J]. 计算机研究与发展, 2016, 53(12): 2708-2720. CSTR: 32373.14.issn1000-1239.2016.20160608
Zhu Mengying, Zheng Xiaolin, Wang Chaohui. Investment Recommendation Based on Risk and Surplus in P2P Lending[J]. Journal of Computer Research and Development, 2016, 53(12): 2708-2720. CSTR: 32373.14.issn1000-1239.2016.20160608
Citation: Zhu Mengying, Zheng Xiaolin, Wang Chaohui. Investment Recommendation Based on Risk and Surplus in P2P Lending[J]. Journal of Computer Research and Development, 2016, 53(12): 2708-2720. CSTR: 32373.14.issn1000-1239.2016.20160608

基于风险和剩余价值的在线P2P借贷投资推荐方法

基金项目: 国家自然科学基金项目(61379034,U1509221);国家科技支撑计划基金项目(2014BAH28F05,2015BAH07F01)
详细信息
  • 中图分类号: TP391

Investment Recommendation Based on Risk and Surplus in P2P Lending

  • 摘要: 在线P2P(peer-to-pear)借贷是一种新兴的在线个人财富分配和管理系统,它允许投资人直接对借款人创建的借款标的进行竞标和投资.在P2P借贷平台中,存在一个重要的问题即如何合理分配投资人的投资金额给合适的借款人.针对该问题,提出了一种基于风险和剩余价值最大化的投资推荐框架RTSM(risk total surplus maximize).RTSM首先对借款标的进行风险评估,然后基于经济学中的剩余价值理论,使用投资人和借款人在有风险情况下的剩余价值假设,将风险评估与投资推荐结合在一起,为投资人推荐高收益低风险的投资决策.实验在风险评估和投资推荐2个阶段对美国和中国知名的P2P借贷平台(Prosper、拍拍贷)的真实数据进行分析和验证.从实验结果可以看出:RTSM可以更好地降低风险和提高投资人与借款人的整体利益.
    Abstract: Online peer-to-peer (P2P) lending, which is a newly personal wealth distribution and management system, has become a new type of financing mode for Internet users. P2P lending platform allows borrowers to create borrow listing and investors to bid and invest borrowers’ listing directly. In the P2P lending, there is a significant issue that is how to reasonably match borrowers and investors and then allocate the amount of investors, so as to recommend low risk and high rate investment decisions to the investors. This paper proposes a recommendation framework risk based total surplus risk total surplus maximize (RTSM), which can solve the problem of allocating the investment amount into borrowers’ listings. Specifically, we first propose to adapt various methods of regression to evaluate default risk. Then, we give the hypothesis the surplus of investors and borrowers under default risk which is based on the theory of surplus in economics. And based on this hypothesis, we combine the risk assessment and investment recommendation to maximize the total surplus under default risk. We apply the recommendation framework RTSM into two real-world datasets (Prosper and PPDai). Finally, experiments and analysis indicate that RTSM can reduce risk and improve the overall benefits of both investors and borrowers.
  • 期刊类型引用(10)

    1. 杨秀璋,彭国军,刘思德,田杨,李晨光,傅建明. 面向APT攻击的溯源和推理研究综述. 软件学报. 2025(01): 203-252 . 百度学术
    2. 申国霞,常鑫. 基于可信密码模块的网络信道潜在攻击挖掘. 信息技术. 2023(10): 152-156+162 . 百度学术
    3. 谢峥,路广平,付安民. 一种可扩展的实时多步攻击场景重构方法. 信息安全研究. 2023(12): 1173-1179 . 百度学术
    4. 黄维贵,孙怡峰,欧旺,王玉宾. 基于不确定攻击图的违规外联风险分析. 信息工程大学学报. 2022(05): 570-577 . 百度学术
    5. 王文娟,杜学绘,单棣斌. 基于动态概率攻击图的云环境攻击场景构建方法. 通信学报. 2021(01): 1-17 . 百度学术
    6. 潘亚峰,朱俊虎,周天阳. APT攻击场景重构方法综述. 信息工程大学学报. 2021(01): 55-60+80 . 百度学术
    7. 罗智勇,杨旭,刘嘉辉,许瑞. 基于贝叶斯攻击图的网络入侵意图分析模型. 通信学报. 2020(09): 160-169 . 百度学术
    8. 王硕,王建华,汤光明,裴庆祺,张玉臣,刘小虎. 一种智能高效的最优渗透路径生成方法. 计算机研究与发展. 2019(05): 929-941 . 本站查看
    9. 吴东,郭春,申国伟. 一种基于多因素的告警关联方法. 计算机与现代化. 2019(06): 30-37 . 百度学术
    10. 韩宜轩,秦元庆. 基于因果关联的电力工控系统攻击场景还原. 信息技术. 2019(08): 41-44+48 . 百度学术

    其他类型引用(12)

计量
  • 文章访问数:  1337
  • HTML全文浏览量:  1
  • PDF下载量:  679
  • 被引次数: 22
出版历程
  • 发布日期:  2016-11-30

目录

    /

    返回文章
    返回