Abstract
This paper presents the development of an intelligent, machine learning-based Markov chain model to investigate loan risk and strategies for controlling credit risk. The model involves modeling state transitions of loan accounts using a Markov transition matrix and optimizing collection actions at each state and age for each consumer type to maximize the expected value for the lender. To enhance the performance of the minority class, we have designed some new algorithms and developed a consecutive incremental batch learning framework within the model. In addition, we use the variational inference method and logistic regression model to address the imbalanced data gap during the traditional machine learning process. We expect that the results of this study will lead to a more accurate and effective machine learning-based prediction method and make a significant contribution to the credit risk field.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
The derivation in this section is standard in the literature on variational approximation and will at times follow the arguments in Bishop (2006) and Jordan et al. (1999).
References
Wang, C., et al.: A novel evolutionary algorithm with column and sub-block local search for sudoku puzzles. IEEE Trans. Games (2023). https://api.semanticscholar.org/CorpusID:255879353
Yang, J.Q., et al.: Bi-directional feature fixation-based particle swarm optimization for large-scale feature selection. IEEE Trans. Big Data 9, 1004–1017 (2023)
Alvi, A.M., Siuly, S., Wang, H.: A long short-term memory based framework for early detection of mild cognitive impairment from EEG signals. IEEE Trans. Emerg. Top. Comput. Intell. 7, 375–388 (2023)
Berger, J.O., Pericchi, L.R.: The intrinsic bayes factor for linear models. Bayesian Stat. 5, 25–44 (1996)
Bhargavi, B., Rani, K.S., Neog, A.: Finding multidimensional constraint reachable paths for attributed graphs. EAI Endorsed Trans. Scalable Inf. Syst. 10, e8 (2022)
Bishop, C.M.: Pattern Recognition and Machine Learning. Springer, New York (2006)
Diggle, P., Diggle, P.J., Heagerty, P., Liang, K.Y., Zeger, S., et al.: Analysis of Longitudinal Data. Oxford University Press, Oxford (2002)
Du, J., Michalska, S., Subramani, S., Wang, H., Zhang, Y.: Neural attention with character embeddings for hay fever detection from twitter. Health Inf. Sci. Syst. 7(1), 1–7 (2019). https://doi.org/10.1007/s13755-019-0084-2
Durante, D., Rigon, T.: Conditionally conjugate mean-field variational bayes for logistic models (2019)
Hu, H., Li, J., Wang, H., Daggard, G., Shi, M.: A maximally diversified multiple decision tree algorithm for microarray data classification (2006). https://api.semanticscholar.org/CorpusID:12168114
Jaakkola, T.S., Jordan, M.I.: Bayesian parameter estimation via variational methods. Stat. Comput. 10(1), 25–37 (2000)
Li, J.-Y., et al.: Distributed differential evolution with adaptive resource allocation. IEEE Trans. Cybern. 53, 2791–2804 (2022)
Yin, J., et al.: Knowledge-driven cybersecurity intelligence: software vulnerability coexploitation behavior discovery. IEEE Trans. Ind. Inform. 19, 5593–5601 (2023)
Jordan, M.I., Ghahramani, Z., Jaakkola, T.S., Saul, L.K.: An introduction to variational methods for graphical models. Mach. Learn. 37(2), 183–233 (1999)
Khalil, F., Li, J., Wang, H.: A framework of combining Markov model with association rules for predicting web page accesses. In: Australasian Data Mining Conference (2006). https://api.semanticscholar.org/CorpusID:6255653
Khalil, F., Wang, H., Li, J.: Integrating Markov model with clustering for predicting web page accesses (2007). https://api.semanticscholar.org/CorpusID:20151972
Lee, J., Park, J.S., Wang, K., Feng, B., Tennant, M., Kruger, E.: The use of telehealth during the coronavirus (covid-19) pandemic in oral and maxillofacial surgery - a qualitative analysis. EAI Endorsed Trans. Scalable Inf. Syst. 9, 2 (2021)
Li, A., Pericchi, L., Wang, K.: Objective Bayesian inference in probit models with intrinsic priors using variational approximations. Entropy 22(5), 513 (2020)
Ormerod, J.T., Wand, M.P.: Explaining variational approximations. Am. Stat. 64(2), 140–153 (2010)
Pandey, D., Wang, H., Yin, X., Wang, K.N., Zhang, Y., Shen, J.: Automatic breast lesion segmentation in phase preserved DCE-MRIs. Health Inf. Sci. Syst. 10 (2022). https://api.semanticscholar.org/CorpusID:248924735
Pang, X., Ge, Y.F., Wang, K.N., Traina, A.J.M., Wang, H.: Patient assignment optimization in cloud healthcare systems: a distributed genetic algorithm. Health Inf. Sci. Syst. 11 (2023). https://api.semanticscholar.org/CorpusID:259277247
Polson, N.G., Scott, J.G., Windle, J.: Bayesian inference for logistic models using pólya-gamma latent variables. J. Am. Stat. Assoc. 108(504), 1339–1349 (2013)
Qin, Y., Sheng, Q.Z., Falkner, N.J.G., Dustdar, S., Wang, H., Vasilakos, A.V.: When things matter: a data-centric view of the internet of things. arXiv abs/1407.2704 (2014)
Sahani, G., Thaker, C.S., Shah, S.M.: Supervised learning-based approach mining ABAC rules from existing RBAC enabled systems. EAI Endorsed Trans. Scalable Inf. Syst. 10, e9 (2022)
Siddiqui, S.A., Fatima, N., Ahmad, A.: Chest X-ray and CT scan classification using ensemble learning through transfer learning. EAI Endorsed Trans. Scalable Inf. Syst. 9, e8 (2022)
Singh, R., et al.: Antisocial behavior identification from twitter feeds using traditional machine learning algorithms and deep learning. ICST Trans. Scalable Inf. Syst. (2023). https://api.semanticscholar.org/CorpusID:258671645
Smith, L.D., Lawrence, E.C.: Forecasting losses on a liquidating long-term loan portfolio. J. Bank. Financ. 19(6), 959–985 (1995)
Sun, X., Wang, H., Li, J., Zhang, Y.: Satisfying privacy requirements before data anonymization. Comput. J. 55, 422–437 (2012)
Wang, H., Yi, X., Bertino, E., Sun, L.: Protecting outsourced data in cloud computing through access management. Concurr. Comput. Pract. Exp. 28, 600–615 (2016)
Wang, H., Zhang, Y., Cao, J., Varadharajan, V.: Achieving secure and flexible m-services through tickets. IEEE Trans. Syst. Man Cybern. Part A 33, 697–708 (2003)
Yin, J., Tang, M., Cao, J., Wang, H., You, M., Lin, Y.: Vulnerability exploitation time prediction: an integrated framework for dynamic imbalanced learning. World Wide Web 25, 401–423 (2021)
You, M., Yin, J., Wang, H., Cao, J., Miao, Y.: A minority class boosted framework for adaptive access control decision-making. In: WISE (2021). https://api.semanticscholar.org/CorpusID:244852711
You, M., et al.: A knowledge graph empowered online learning framework for access control decision-making. World Wide Web 26, 827–848 (2022)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Wang, K., Li, A., Wang, X., Sun, L. (2023). Study on Credit Risk Control by Variational Inference. In: Zhang, F., Wang, H., Barhamgi, M., Chen, L., Zhou, R. (eds) Web Information Systems Engineering – WISE 2023. WISE 2023. Lecture Notes in Computer Science, vol 14306. Springer, Singapore. https://doi.org/10.1007/978-981-99-7254-8_62
Download citation
DOI: https://doi.org/10.1007/978-981-99-7254-8_62
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-7253-1
Online ISBN: 978-981-99-7254-8
eBook Packages: Computer ScienceComputer Science (R0)