|
|
Constructing Domain Ontology for Intelligent Applications: Case Study of Anti Tele-Fraud |
Shiqi Deng,Liang Hong() |
School of Information Management, Wuhan University, Wuhan 430072, China |
|
|
Abstract [Objective] This paper tries to build domain ontology for intelligent applications, aiming to enhance the capability of domain knowledge representing and application development. [Methods] We proposed the application-driven circulation method to model cross-domain knowledge based on the demands of intelligent applications. It has the structure of “requirement + construction + evaluation”, so that requirements play leading role in ontology construction. We took the field of anti telephone fraud as an example, and constructed the anti-fraud ontology of the intelligent requirements. [Results] Our anti-fraud domain ontology represented a wide range of cross-domain knowledge and effectively supported intelligent anti-fraud applications, which were based on the semantics of fraudulent calls. [Limitations] More research is needed to examine the requirements of intelligent applications. [Conclusions] The proposed method promotes more research in domain ontology construction and anti-fraud methods.
|
Received: 14 November 2018
Published: 06 September 2019
|
|
Corresponding Authors:
Liang Hong
E-mail: hong@whu.edu.cn
|
[1] |
Gruber T R . A Translation Approach to Portable Ontology Specifications[J]. Knowledge Acquisition, 1993,5(2):199-220.
|
[2] |
Stenzhorn H, Schulz S, Beiwanger E, et al. BioTop and ChemTop: Top-Domain Ontologies for Biology and Chemistry [C]// Proceedings of the 2007 International Conference on Posters and Demonstrations. 2008,401:50-51.
|
[3] |
Uschold M, Gruninger M . Ontologies: Principles, Methods and Applications[J]. Knowledge Engineering Review, 1996,11(2):93-136.
|
[4] |
Noy N F , McGuinness D L. Ontology Development 101: A Guide to Creating Your First Ontology[R]. Stanford Knowledge Systems Laboratory, 2001.
|
[5] |
Maedche A, Staab S . Ontology Learning for the Semantic Web[J]. Intelligent Systems IEEE, 2001,16(2):72-79.
|
[6] |
Doran P, Tamma V, Iannone L. Ontology Module Extraction for Ontology Reuse: An Ontology Engineering Perspective [C]// Proceedings of the 16th ACM Conference on Information and Knowledge Management. ACM, 2007: 61-70.
|
[7] |
付苓 . 大数据环境下领域本体构建框架研究[J]. 图书馆, 2017(11):66-71.
|
[7] |
( Fu Ling . Research on Construction Framework of Domain Ontology for Big Data[J]. Library, 2017(11):66-71.)
|
[8] |
于娟, 施文洁, 朱正祥 . 基于本体的人物关系一致性检测方法研究[J]. 情报学报, 2018,37(1):98-105.
|
[8] |
( Yu Juan, Shi Wenjie, Zhu Zhengxiang . Consistency Detection of Interpersonal Relationship: An Ontology-based Method[J]. Journal of the China Society for Scientific and Technical Information, 2018,37(1):98-105.)
|
[9] |
徐雷 . 本体评估研究进展[J]. 情报学报, 2016,35(7):772-784.
|
[9] |
( Xu Lei . Research Advances in Ontology Evaluation[J]. Journal of the China Society for Scientific and Technical Information, 2016,35(7):772-784.)
|
[10] |
杨晶, 曹金璇, 高华林 . 基于本体的电信诈骗分析知识库模型[J]. 计算机工程与设计, 2017,38(6):1418-1423.
|
[10] |
( Yang Jing, Cao Jinxuan, Gao Hualin . Telecommunications Fraud Case Analysis Knowledge Base Model Based on Ontology[J]. Computer Engineering and Design, 2017,38(6):1418-1423.)
|
[11] |
Carvalho R, Goldsmith M, Creese S. Applying Semantic Technologies to Fight Online Banking Fraud [C]// Proceedings of the 2015 European Intelligence and Security Informatics Conference. IEEE, 2015: 61-68.
|
[12] |
Tang X B, Wei W, Liu G C , et al. An Inference Model of Medical Insurance Fraud Detection: Based on Ontology and SWRL[J]. Knowledge Organization, 2017(2):84-96.
|
[13] |
司成, 张红旗, 汪永伟 , 等. 基于本体的网络安全态势要素知识库模型研究[J]. 计算机科学, 2015,42(5):173-177.
|
[13] |
( Si Cheng, Zhang Hongqi, Wang Yongwei , et al. Research on Network Security Situational Elements Knowledge Base Model Based on Ontology[J]. Computer Science, 2015,42(5):173-177.)
|
[14] |
Yao Y, Ma X, Liu H, et al. A Semantic Knowledge Base Construction Method for Information Security [C]// Proceedings of the 13th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, 2014: 803-808.
|
[15] |
李力卡, 马泽雄, 陈庆年 , 等. 大数据技术在防诈骗系统应用及运营实践[J]. 广东通信技术, 2016,36(10):2-5, 30.
|
[15] |
( Li Lika, Ma Zexiong, Chen Qingnian , et al. Application and Operation Practice of Big Data Technology in Anti-fraud System[J]. Guangdong Communication Technology, 2016,36(10):2-5, 30.)
|
[16] |
李力卡, 马泽雄, 陈庆年 , 等. 电话诈骗防治技术解决方案与运维对策研究[J]. 电信科学, 2014,30(11):166-172.
|
[16] |
( Li Lika, Ma Zexiong, Chen Qingnian , et al. Research of Technology Solutions and Operation Countermeasures to Telephone Fraud Prevention and Control[J]. Telecommunications Science, 2014,30(11):166-172.)
|
[17] |
张慧嫦, 李力卡 . 基于信令的电话诈骗行为检测及防范研究[J]. 广东通信技术, 2016,36(10):6-9, 45.
|
[17] |
( Zhang Huichang, Li Lika . Study on Detection and Prevention of Telephone Fraud Based on Signaling[J]. Guangdong Communication Technology, 2016,36(10):6-9, 45.)
|
[18] |
王志刚, 曲劲光 . 基于大数据的电信诈骗治理技术研究[J]. 电信工程技术与标准化, 2017,30(4):86-89.
|
[18] |
( Wang Zhigang, Qu Jinguang . Research on Anti Telecommunications Fraud Technology Based on Big Data[J]. Telecom Engineering Technics and Standardization, 2017,30(4):86-89.)
|
[19] |
腾讯安全“守护者计划”.鹰眼智能反电话诈骗盒子[EB/OL]. [ 2018- 05- 14]. .
|
[19] |
( Tencent Security “Guardian Program”. Hawkeye Intelligent Anti-Phone Fraud Box [EB/OL]. [ 2018- 05- 14].
|
[20] |
马博 . 一种基于语音语义内容分析的防电信电话诈骗方法和系统: 中国, CN103179122 B[P]. 2015.
|
[20] |
( Ma Bo . A Method and System for Anti-Telephone Fraud Based on Speech Semantic Content Analysis: China, CN103179122 B[P]. 2015.)
|
[21] |
上海欣方智能系统有限公司 . 对可疑号码进行诈骗样本甄别归类及拦截的方法及系统:中国, CN201611052505.8[P]. 2017 -03-29.
|
[21] |
( Shanghai Xinfang Intelligent System Company Limited. Method and System for Screening and Intercepting Suspicious Numbers for Fraud Samples: China, CN201611052505.8[P]. 2017-03-29.)
|
[22] |
国家互联网应急中心[EB/OL]. [ 2018- 05- 11] .
|
[22] |
( National Internet Emergency Center [EB/OL]. [ 2018- 05- 11].
|
[23] |
电话邦, 可信号码数据中心. 2017 年度骚扰、诈骗电话形势分析报告[EB/OL]. [2018-04-05]. .
|
[23] |
( Telephone State, Trusted Number Data Center. Harassment, Fraud Telephone Situation Analysis Report in 2017[EB/OL]. [ 2018-04-05]. .)
|
[24] |
Apache Jena. Jena 2 Ontology API[OL]. [ 2018- 05- 14]. .
|
[25] |
Lozano-Tello A, Gómez-Pérez A . ONTOMETRIC: A Method to Choose the Appropriate Ontology[J]. Journal of Database Management, 2004,15(2):1-18.
|
[26] |
Tartir S, Arpinar I B, Moore M, et al. OntoQA: Metric-Based Ontology Quality Analysis [C]// Proceedings of the IEEE Workshop on Knowledge Acquisition from Distributed, Autonomous, Semantically Heterogeneous Data and Knowledge Sources. IEEE, 2005.
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|