Nothing Special   »   [go: up one dir, main page]

Skip to main content

Constructing a User Preference Ontology for Anti-spam Mail Systems

  • Conference paper
Advances in Artificial Intelligence (Canadian AI 2007)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4509))

Abstract

The judgment that whether an email is spam or non-spam may vary from person to person. Different individuals can have totally different responses to the same email based on their preferences. This paper presents an innovative approach that incorporates user preferences to construct an anti-spam mail system, which is different from the conventional content-based approaches. We build a user preference ontology to formally represent the important concepts and rules derived from a data mining process. Then we use an inference engine that utilizes the knowledge to predict the user’s action on new incoming emails. We also suggest a new rule optimization procedure inspired from logic synthesis to improve comprehensibility and exclude redundant rules. Experimental results showed that our user preference based architecture achieved good performance and the rules derived from the architecture and the optimization method have better quality in terms of comprehensibility.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Cormack, G.V.: Overview of the TREC 2005 Spam Track (2005), http://plg.uwaterloo.ca/~gvcormac/trecspamtrack05

  2. Wolfe, P., Scott, C., Erwin, M.: Anti-Spam Tool Kit. McGraw-Hill, New York (2004)

    Google Scholar 

  3. Gray, A., Haahr, M.: Personalized, Collaborative Spam Filtering. In: Proc. of the First Conference on Email and Anti-Spam (2004)

    Google Scholar 

  4. Ravi, J., Shi, W., Xu, C.: Personalized Email Management at Network Edges. IEEE Internet Computing 9(2), 54–60 (2005)

    Article  Google Scholar 

  5. Anti-Spam Firewall, http://www.barracudanetworks.com/ns/products/anti_spam_tech.php

  6. Maedche, A.: Ontology Learning for the Semantic Web. The Kluwer International Series in Engineering and Computer Science, vol. 665. Kluwer Academic Publishers, Dordrecht (2003)

    Google Scholar 

  7. Files, C.M., Perkowski, M.A.: Multi-Valued Functional Decomposition as a Machine Learning Method. In: Proc. of ISMVL ’98, pp. 173–178 (1998)

    Google Scholar 

  8. Chan, A., Freitas, A.: A New Classification-Rule Pruning Procedure for an Ant Colony Algorithm. In: Talbi, E.-G., Liardet, P., Collet, P., Lutton, E., Schoenauer, M. (eds.) EA 2005. LNCS, vol. 3871, pp. 25–36. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  9. Sasao, T.: Switching Theory for Logic Synthesis. Kluwer Academic Publishers, Dordrecht (1999)

    MATH  Google Scholar 

  10. Kim, J., Kang, S.: Feature Selection by Fuzzy Inference and Its Application to Spam-Mail Filtering. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y.-m., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS (LNAI), vol. 3801, pp. 361–366. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  11. Witten, I.H., Frank, E.: Data Mining: practical machine learning tools and techniques, 2nd edn. Morgan Kaufmann, San Francisco (2005)

    MATH  Google Scholar 

  12. Gruber, T.R.: Toward Principles for the Design of Ontologies Used for Knowledge Sharing. Int. Journal of Human-Computer Studies 43, 907–928 (1995)

    Article  Google Scholar 

  13. McDermott, D., Dou, D.: Representing disjunction and quantifiers in RDF. In: Horrocks, I., Hendler, J. (eds.) ISWC 2002. LNCS, vol. 2342, pp. 250–263. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  14. OWL Web Ontology Language, http://www.w3.org/TR/owl-ref/

  15. SWRL: A Semantic Web Rule Language Combining OWL and RuleML, http://www.w3.org/Submission/SWRL/

  16. Dou, D., McDermott, V., Qi, P.: Ontology translation on the semantic web. Journal of Data Semantics 2, 35–57 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Ziad Kobti Dan Wu

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Kim, J., Dou, D., Liu, H., Kwak, D. (2007). Constructing a User Preference Ontology for Anti-spam Mail Systems. In: Kobti, Z., Wu, D. (eds) Advances in Artificial Intelligence. Canadian AI 2007. Lecture Notes in Computer Science(), vol 4509. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72665-4_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-72665-4_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-72664-7

  • Online ISBN: 978-3-540-72665-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics