Skip to main content

Study on Credit Risk Control by Variational Inference

  • Conference paper
  • First Online:
Web Information Systems Engineering – WISE 2023 (WISE 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14306))

Included in the following conference series:

  • 688 Accesses

Abstract

This paper presents the development of an intelligent, machine learning-based Markov chain model to investigate loan risk and strategies for controlling credit risk. The model involves modeling state transitions of loan accounts using a Markov transition matrix and optimizing collection actions at each state and age for each consumer type to maximize the expected value for the lender. To enhance the performance of the minority class, we have designed some new algorithms and developed a consecutive incremental batch learning framework within the model. In addition, we use the variational inference method and logistic regression model to address the imbalanced data gap during the traditional machine learning process. We expect that the results of this study will lead to a more accurate and effective machine learning-based prediction method and make a significant contribution to the credit risk field.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The derivation in this section is standard in the literature on variational approximation and will at times follow the arguments in Bishop (2006) and Jordan et al. (1999).

References

  1. Wang, C., et al.: A novel evolutionary algorithm with column and sub-block local search for sudoku puzzles. IEEE Trans. Games (2023). https://api.semanticscholar.org/CorpusID:255879353

  2. Yang, J.Q., et al.: Bi-directional feature fixation-based particle swarm optimization for large-scale feature selection. IEEE Trans. Big Data 9, 1004–1017 (2023)

    Article  Google Scholar 

  3. Alvi, A.M., Siuly, S., Wang, H.: A long short-term memory based framework for early detection of mild cognitive impairment from EEG signals. IEEE Trans. Emerg. Top. Comput. Intell. 7, 375–388 (2023)

    Article  Google Scholar 

  4. Berger, J.O., Pericchi, L.R.: The intrinsic bayes factor for linear models. Bayesian Stat. 5, 25–44 (1996)

    MathSciNet  Google Scholar 

  5. Bhargavi, B., Rani, K.S., Neog, A.: Finding multidimensional constraint reachable paths for attributed graphs. EAI Endorsed Trans. Scalable Inf. Syst. 10, e8 (2022)

    Google Scholar 

  6. Bishop, C.M.: Pattern Recognition and Machine Learning. Springer, New York (2006)

    MATH  Google Scholar 

  7. Diggle, P., Diggle, P.J., Heagerty, P., Liang, K.Y., Zeger, S., et al.: Analysis of Longitudinal Data. Oxford University Press, Oxford (2002)

    Google Scholar 

  8. Du, J., Michalska, S., Subramani, S., Wang, H., Zhang, Y.: Neural attention with character embeddings for hay fever detection from twitter. Health Inf. Sci. Syst. 7(1), 1–7 (2019). https://doi.org/10.1007/s13755-019-0084-2

    Article  Google Scholar 

  9. Durante, D., Rigon, T.: Conditionally conjugate mean-field variational bayes for logistic models (2019)

    Google Scholar 

  10. Hu, H., Li, J., Wang, H., Daggard, G., Shi, M.: A maximally diversified multiple decision tree algorithm for microarray data classification (2006). https://api.semanticscholar.org/CorpusID:12168114

  11. Jaakkola, T.S., Jordan, M.I.: Bayesian parameter estimation via variational methods. Stat. Comput. 10(1), 25–37 (2000)

    Article  Google Scholar 

  12. Li, J.-Y., et al.: Distributed differential evolution with adaptive resource allocation. IEEE Trans. Cybern. 53, 2791–2804 (2022)

    Article  Google Scholar 

  13. Yin, J., et al.: Knowledge-driven cybersecurity intelligence: software vulnerability coexploitation behavior discovery. IEEE Trans. Ind. Inform. 19, 5593–5601 (2023)

    Article  Google Scholar 

  14. Jordan, M.I., Ghahramani, Z., Jaakkola, T.S., Saul, L.K.: An introduction to variational methods for graphical models. Mach. Learn. 37(2), 183–233 (1999)

    Article  MATH  Google Scholar 

  15. Khalil, F., Li, J., Wang, H.: A framework of combining Markov model with association rules for predicting web page accesses. In: Australasian Data Mining Conference (2006). https://api.semanticscholar.org/CorpusID:6255653

  16. Khalil, F., Wang, H., Li, J.: Integrating Markov model with clustering for predicting web page accesses (2007). https://api.semanticscholar.org/CorpusID:20151972

  17. Lee, J., Park, J.S., Wang, K., Feng, B., Tennant, M., Kruger, E.: The use of telehealth during the coronavirus (covid-19) pandemic in oral and maxillofacial surgery - a qualitative analysis. EAI Endorsed Trans. Scalable Inf. Syst. 9, 2 (2021)

    Google Scholar 

  18. Li, A., Pericchi, L., Wang, K.: Objective Bayesian inference in probit models with intrinsic priors using variational approximations. Entropy 22(5), 513 (2020)

    Article  MathSciNet  Google Scholar 

  19. Ormerod, J.T., Wand, M.P.: Explaining variational approximations. Am. Stat. 64(2), 140–153 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  20. Pandey, D., Wang, H., Yin, X., Wang, K.N., Zhang, Y., Shen, J.: Automatic breast lesion segmentation in phase preserved DCE-MRIs. Health Inf. Sci. Syst. 10 (2022). https://api.semanticscholar.org/CorpusID:248924735

  21. Pang, X., Ge, Y.F., Wang, K.N., Traina, A.J.M., Wang, H.: Patient assignment optimization in cloud healthcare systems: a distributed genetic algorithm. Health Inf. Sci. Syst. 11 (2023). https://api.semanticscholar.org/CorpusID:259277247

  22. Polson, N.G., Scott, J.G., Windle, J.: Bayesian inference for logistic models using pólya-gamma latent variables. J. Am. Stat. Assoc. 108(504), 1339–1349 (2013)

    Article  MATH  Google Scholar 

  23. Qin, Y., Sheng, Q.Z., Falkner, N.J.G., Dustdar, S., Wang, H., Vasilakos, A.V.: When things matter: a data-centric view of the internet of things. arXiv abs/1407.2704 (2014)

    Google Scholar 

  24. Sahani, G., Thaker, C.S., Shah, S.M.: Supervised learning-based approach mining ABAC rules from existing RBAC enabled systems. EAI Endorsed Trans. Scalable Inf. Syst. 10, e9 (2022)

    Google Scholar 

  25. Siddiqui, S.A., Fatima, N., Ahmad, A.: Chest X-ray and CT scan classification using ensemble learning through transfer learning. EAI Endorsed Trans. Scalable Inf. Syst. 9, e8 (2022)

    Google Scholar 

  26. Singh, R., et al.: Antisocial behavior identification from twitter feeds using traditional machine learning algorithms and deep learning. ICST Trans. Scalable Inf. Syst. (2023). https://api.semanticscholar.org/CorpusID:258671645

  27. Smith, L.D., Lawrence, E.C.: Forecasting losses on a liquidating long-term loan portfolio. J. Bank. Financ. 19(6), 959–985 (1995)

    Article  Google Scholar 

  28. Sun, X., Wang, H., Li, J., Zhang, Y.: Satisfying privacy requirements before data anonymization. Comput. J. 55, 422–437 (2012)

    Article  Google Scholar 

  29. Wang, H., Yi, X., Bertino, E., Sun, L.: Protecting outsourced data in cloud computing through access management. Concurr. Comput. Pract. Exp. 28, 600–615 (2016)

    Article  Google Scholar 

  30. Wang, H., Zhang, Y., Cao, J., Varadharajan, V.: Achieving secure and flexible m-services through tickets. IEEE Trans. Syst. Man Cybern. Part A 33, 697–708 (2003)

    Article  Google Scholar 

  31. Yin, J., Tang, M., Cao, J., Wang, H., You, M., Lin, Y.: Vulnerability exploitation time prediction: an integrated framework for dynamic imbalanced learning. World Wide Web 25, 401–423 (2021)

    Google Scholar 

  32. You, M., Yin, J., Wang, H., Cao, J., Miao, Y.: A minority class boosted framework for adaptive access control decision-making. In: WISE (2021). https://api.semanticscholar.org/CorpusID:244852711

  33. You, M., et al.: A knowledge graph empowered online learning framework for access control decision-making. World Wide Web 26, 827–848 (2022)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kun Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, K., Li, A., Wang, X., Sun, L. (2023). Study on Credit Risk Control by Variational Inference. In: Zhang, F., Wang, H., Barhamgi, M., Chen, L., Zhou, R. (eds) Web Information Systems Engineering – WISE 2023. WISE 2023. Lecture Notes in Computer Science, vol 14306. Springer, Singapore. https://doi.org/10.1007/978-981-99-7254-8_62

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-7254-8_62

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-7253-1

  • Online ISBN: 978-981-99-7254-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics