[Objective] This paper tries to build domain ontology for intelligent applications, aiming to enhance the capability of domain knowledge representing and application development. [Methods] We proposed the application-driven circulation method to model cross-domain knowledge based on the demands of intelligent applications. It has the structure of “requirement + construction + evaluation”, so that requirements play leading role in ontology construction. We took the field of anti telephone fraud as an example, and constructed the anti-fraud ontology of the intelligent requirements. [Results] Our anti-fraud domain ontology represented a wide range of cross-domain knowledge and effectively supported intelligent anti-fraud applications, which were based on the semantics of fraudulent calls. [Limitations] More research is needed to examine the requirements of intelligent applications. [Conclusions] The proposed method promotes more research in domain ontology construction and anti-fraud methods.
邓诗琦,洪亮. 面向智能应用的领域本体构建研究*——以反电话诈骗领域为例[J]. 数据分析与知识发现, 2019, 3(7): 73-84.
Shiqi Deng,Liang Hong. Constructing Domain Ontology for Intelligent Applications: Case Study of Anti Tele-Fraud. Data Analysis and Knowledge Discovery, 2019, 3(7): 73-84.
其中, $|{{H}^{C}}({{C}_{1}},{{C}_{i}})|)$为每个类${{C}_{i}}$的子类${{C}_{1}}$的数量; $\left| C \right|$为类的总量
OntoQA模式组指标含义[26]
从诈骗通话文本抽取诈骗流程
“高雄诈骗团伙”相关诈骗电话实例模型
[1]
Gruber T R . A Translation Approach to Portable Ontology Specifications[J]. Knowledge Acquisition, 1993,5(2):199-220.
[2]
Stenzhorn H, Schulz S, Beiwanger E, et al. BioTop and ChemTop: Top-Domain Ontologies for Biology and Chemistry [C]// Proceedings of the 2007 International Conference on Posters and Demonstrations. 2008,401:50-51.
[3]
Uschold M, Gruninger M . Ontologies: Principles, Methods and Applications[J]. Knowledge Engineering Review, 1996,11(2):93-136.
[4]
Noy N F , McGuinness D L. Ontology Development 101: A Guide to Creating Your First Ontology[R]. Stanford Knowledge Systems Laboratory, 2001.
[5]
Maedche A, Staab S . Ontology Learning for the Semantic Web[J]. Intelligent Systems IEEE, 2001,16(2):72-79.
[6]
Doran P, Tamma V, Iannone L. Ontology Module Extraction for Ontology Reuse: An Ontology Engineering Perspective [C]// Proceedings of the 16th ACM Conference on Information and Knowledge Management. ACM, 2007: 61-70.
[7]
付苓 . 大数据环境下领域本体构建框架研究[J]. 图书馆, 2017(11):66-71.
[7]
( Fu Ling . Research on Construction Framework of Domain Ontology for Big Data[J]. Library, 2017(11):66-71.)
( Yu Juan, Shi Wenjie, Zhu Zhengxiang . Consistency Detection of Interpersonal Relationship: An Ontology-based Method[J]. Journal of the China Society for Scientific and Technical Information, 2018,37(1):98-105.)
[9]
徐雷 . 本体评估研究进展[J]. 情报学报, 2016,35(7):772-784.
[9]
( Xu Lei . Research Advances in Ontology Evaluation[J]. Journal of the China Society for Scientific and Technical Information, 2016,35(7):772-784.)
( Yang Jing, Cao Jinxuan, Gao Hualin . Telecommunications Fraud Case Analysis Knowledge Base Model Based on Ontology[J]. Computer Engineering and Design, 2017,38(6):1418-1423.)
[11]
Carvalho R, Goldsmith M, Creese S. Applying Semantic Technologies to Fight Online Banking Fraud [C]// Proceedings of the 2015 European Intelligence and Security Informatics Conference. IEEE, 2015: 61-68.
[12]
Tang X B, Wei W, Liu G C , et al. An Inference Model of Medical Insurance Fraud Detection: Based on Ontology and SWRL[J]. Knowledge Organization, 2017(2):84-96.
( Si Cheng, Zhang Hongqi, Wang Yongwei , et al. Research on Network Security Situational Elements Knowledge Base Model Based on Ontology[J]. Computer Science, 2015,42(5):173-177.)
[14]
Yao Y, Ma X, Liu H, et al. A Semantic Knowledge Base Construction Method for Information Security [C]// Proceedings of the 13th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, 2014: 803-808.
( Li Lika, Ma Zexiong, Chen Qingnian , et al. Application and Operation Practice of Big Data Technology in Anti-fraud System[J]. Guangdong Communication Technology, 2016,36(10):2-5, 30.)
( Li Lika, Ma Zexiong, Chen Qingnian , et al. Research of Technology Solutions and Operation Countermeasures to Telephone Fraud Prevention and Control[J]. Telecommunications Science, 2014,30(11):166-172.)
( Zhang Huichang, Li Lika . Study on Detection and Prevention of Telephone Fraud Based on Signaling[J]. Guangdong Communication Technology, 2016,36(10):6-9, 45.)
( Wang Zhigang, Qu Jinguang . Research on Anti Telecommunications Fraud Technology Based on Big Data[J]. Telecom Engineering Technics and Standardization, 2017,30(4):86-89.)
( Shanghai Xinfang Intelligent System Company Limited. Method and System for Screening and Intercepting Suspicious Numbers for Fraud Samples: China, CN201611052505.8[P]. 2017-03-29.)
[22]
国家互联网应急中心[EB/OL]. [ 2018- 05- 11] .
[22]
( National Internet Emergency Center [EB/OL]. [ 2018- 05- 11].
Lozano-Tello A, Gómez-Pérez A . ONTOMETRIC: A Method to Choose the Appropriate Ontology[J]. Journal of Database Management, 2004,15(2):1-18.
[26]
Tartir S, Arpinar I B, Moore M, et al. OntoQA: Metric-Based Ontology Quality Analysis [C]// Proceedings of the IEEE Workshop on Knowledge Acquisition from Distributed, Autonomous, Semantically Heterogeneous Data and Knowledge Sources. IEEE, 2005.