Welcome to Scholar Publishing Group

Machine Learning Theory and Practice, 2020, 1(3); doi: 10.38007/ML.2020.010304.

Risk Monitoring and Early Warning of P2P Network Loan Platform Based on Machine Learning

Author(s)

Xiaokui Zhao

Corresponding Author:
Xiaokui Zhao
Affiliation(s)

Qinghai Normal University, Qinghai, China

Abstract

With the rapid development of Internet finance, P2P online lending platform (LP) has also been growing rapidly. However, due to its own many risks, China's P2P online loan industry is facing huge challenges. Therefore, this paper intends to use machine learning related algorithms to predict and prevent the risk of the LP. This paper takes P2P network LP as the research object, and uses data analysis, case comparison and summary methods to sort out and discuss the current situation of the industry. This paper mainly uses the survey method and the analytic hierarchy process to study the suggestions of both lenders and borrowers and the norms of the platform. The experimental results show that about 24% of borrowers and lenders believe that integrity is the basis for maintaining interests. In order to reduce the risk of the LP, it is necessary to rely on the cooperation between the borrower and the borrower and the national regulation. Therefore, the risk warning of the LP is also an important part.

Keywords

Machine Learning, P2P Network, Lending Platform, Risk Monitoring

Cite This Paper

Xiaokui Zhao. Risk Monitoring and Early Warning of P2P Network Loan Platform Based on Machine Learning. Machine Learning Theory and Practice (2020), Vol. 1, Issue 3: 29-36. https://doi.org/10.38007/ML.2020.010304.

References

[1] Federico Franzoni, Vanesa Daza: SoK: Network-Level Attacks on the Bitcoin P2P Network. IEEE Access 10: 94924-94962 (2020). 

[2] Emmanouil Krasanakis, Symeon Papadopoulos, Ioannis Kompatsiaris: p2pGNN: A Decentralized Graph Neural Network for Node Classification in Peer-to-Peer Networks. IEEE Access 10: 34755-34765 (2020). 

[3] Mohammad Shoab, Saad Aljubayrin: Intelligent Neighbor Selection for Efficient Query Routing in Unstructured P2P Networks Using Q-learning. Appl. Intell. 52(6): 6306-6315 (2020). 

[4] B. N. Jagdale, Jagdish W. Bakal: A Novel Authentication and Authorization Scheme in P2P Networking Using Location-Based Privacy. Evol. Intell. 15(2): 1251-1264 (2020). https://doi.org/10.1007/s12065-020-00375-y

[5] Federico Franzoni, Vanesa Daza: Clover: An Anonymous Transaction Relay Protocol for the Bitcoin P2P Network. Peer-to-Peer Netw. Appl. 15(1): 290-303 (2020). 

[6] Dharmendra Kumar, Mayank Pandey: An Optimal Load Balancing Strategy for P2P Network Using Chicken Swarm Optimization. Peer-to-Peer Netw. Appl. 15(1): 666-688 (2020). 

[7] Sanjeev Kumar Singh, Chiranjeev Kumar, Prem Nath: Resource-Cardinality Based Scheme to Reduce Resource Lookup Cost in Structured P2P Networks. Wirel. Pers. Commun. 125(4): 3351-3377 (2020). 

[8] Sumit Kumar Tetarave, Somanath Tripathy: PJ-Sec: Secure Node Joining in Mobile P2P Networks. CCF Trans. Pervasive Comput. Interact. 3(1): 13-24 (2020). https://doi.org/10.1007/s42486-020-00047-x

[9] Tommi Meskanen, Jarkko Kuusijärvi, Valtteri Niemi: Privacy-Aware Contact Sharing for Groups in P2P Networks. Int. J. Embed. Real Time Commun. Syst. 12(4): 36-54 (2020). 

[10] Lyes Badis, Mourad Amad, Djamil Aïssani, Sofiane Abbar: P2PCF: A Collaborative Filtering Based Recommender System for Peer to Peer Social Networks. J. High Speed Networks 27(1): 13-31 (2020). https://doi.org/10.3233/JHS-210649

[11] Rossano Gaeta, Marco Grangetto: On the robustness of three classes of rateless codes against pollution attacks in P2P networks. Peer-to-Peer Netw. Appl. 14(6): 3595-3604 (2020). 

[12] Prakasam Periasamy, Md Shohel Sayeed, J. Ajayan: Guest Editorials: P2P Computing for 5G, beyond 5G (B5G) Networks and Internet-of-Everything (IoE). Peer-to-Peer Netw. Appl. 14(1): 240-242 (2020). https://doi.org/10.1007/s12083-020-01001-5

[13] Nitin Singha, Yatindra Nath Singh: New Incentive Mechanism to Enhance Cooperation in Wireless P2P Networks. Peer-to-Peer Netw. Appl. 14(3): 1218-1228 (2020). 

[14] Vamseedhar R. Reddyvari, Sarat Chandra Bobbili, Parimal Parag, Srinivas Shakkottai: Mode-Suppression: A Simple, Stable and Scalable Chunk-Sharing Algorithm for P2P Networks. IEEE/ACM Trans. Netw. 29(6): 2548-2559 (2020). 

[15] Sanjeev Kumar Singh, Chiranjeev Kumar, Prem Nath: Analysis and Modelling the Effects of Mobility, Churn Rate, Node's Life Span, Intermittent Bandwidth and Stabilization Cost of Finger Table in Structured Mobile P2P Networks. Wirel. Networks 27(2): 1049-1062 (2020). https://doi.org/10.1007/s11276-020-02493-y

[16] Alexandra Igorevna Kononova, Larisa G. Gagarina: Dynamic Model of Growing File-Sharing P2P Network. Autom. Control. Comput. Sci. 54(7): 645-651 (2020). https://doi.org/10.3103/S014641162007010X

[17] Kensworth Subratie, Saumitra Aditya, Vahid Daneshmand, Kohei Ichikawa, Renato Figueiredo: On the Design and Implementation of IP-over-P2P Overlay Virtual Private Networks. IEICE Trans. Commun. 103-B (1): 2-10 (2020). https://doi.org/10.1587/transcom.2019CPI0001

[18] Pankaj Kumar Jadwal, Sonal Jain, Basant Agarwal: Spectral Clustering and Cost-Sensitive Deep Neural Network-Based Undersampling Approach for P2P Lending Data. Int. J. Inf. Technol. Web Eng. 15(4): 37-52 (2020). https://doi.org/10.4018/IJITWE.2020100103