SlideShare a Scribd company logo
A System to Filter Unwanted Messages from 
OSN User Walls 
Presented By: 
Gajanand Sharma 
M. E. Scholar 
UVCE Bangalore 
Guided By: 
Ms. Vandana Jha 
Ph. D. Scholar 
UVCE Bangalore
 Introduction 
 Related Work 
 Model 
 Algorithm 
 Implementation 
 Performance 
 Conclusion 
 Bibliography
 The underlying issue in today’s Online Social Networks is to give users the 
ability to control the messages posted on their own timeline. 
 Online Social Networks provide a little support to this necessity. 
 The proposed system allows users to have a direct control on their timeline 
posts. 
 This is achieved by using a flexible rule based system allowing users to 
customize the filtering criteria.
 Online Social Networks are one of the most popular medium for communication, 
sharing and broadcasting the human life information. 
 Due to huge and dynamic character of data, web content mining strategies are 
assumed to automatically discover the useful information from the data. 
 In OSNs this strategy is used to filter and remove unwanted posts on the user walls. 
 It can be implemented using ad - hoc classification strategies because wall messages 
contain short text for which traditional classification methods do not work.
 So the aim of proposed system is to evaluate an automated system able to filter 
unwanted messages form user walls. 
 Machine Learning text categorization techniques are used to automatically assign with 
each short text message a set of categories based on its content. 
 By using this technique, short messages are categorized into neutral and non-neutral. 
Then Non-neutral messages are further classified into different categories. 
 By using Filtering Rules, users can state what contents should not be displayed on 
their walls. 
 Filtering Rules exploit user profiles, user relationships as well as the output of the 
Machine Learning categorization process to state the filtering criteria to be enforced.
 The system also provides the support for user-defined Black-Lists. i.e., lists of users 
that are temporarily prevented to post any kind of messages on a user wall.
 N.J. Belkin and W.B. Croft, introduced Information filtering system, in “Information 
Filtering and Information Retrieval: Two Sides of the Same Coin?” 
 P.J. Denning, introduced content based filtering system in paper entitled “Electronic Junk,” 
 P.W. Foltz and S.T. Dumais, also discussed information filtering system in the paper 
“Personalized Information Delivery: An Analysis of Information Filtering Methods,” 
 M. Vanetti, E. Binaghi, B. Carminati, M. Carullo, and E. Ferrari, given the concept of content 
based filtering in the paper “Content-Based Filtering in On-Line Social Networks,”
 The architecture in support of OSN services is a three-tier structure. 
1. Social Network Manager (SNM) 
-Aims to provide the basic OSN functionalities… 
2. Social Network Applications (SNAs) 
-Provides the support for external Social Network Applications… 
3. Graphical User Interfaces (GUIs) 
-GUI to set up and manage FRs/ BLs by users…
A system to filter unwanted messages from OSN user walls
Information 
Filtering 
OSN 
Policy-based 
Personalization 
Short Text 
Classification
 Information filtering 
 Information filtering can be used for a different, more sensitive, purpose. This is 
due to the fact that in OSNs there is the possibility of posting or commenting other 
posts on particular public/private areas, called in general walls. 
 Information filtering can therefore be used to give users the ability to automatically 
control the messages written on their own walls, by filtering out unwanted 
messages.
 Short Text Classifier 
 It is something like first identifying Neutral sentences, then classifying Non-neutral 
sentences… 
 First level task is somehow hard task i.e. labeling massage sentences Neutral or Non- 
Neutral… 
 In second level non-neutral sentences are further classified into different classes… 
 The second level soft classifier produces a gradual membership for each non-neutral 
sentence…
 Policy based Personalization 
 A classification method has been proposed to categorize short text messages in 
order to avoid overwhelming users of microblogging services by raw data. 
 Filtering policy language allows the setting of FRs according to a variety of 
criteria, that do not consider only the results of the classification process but also 
the relationships of the wall owner with other OSN users as well as information on 
the user profile.
Vector Space Model 
 This is the underlying model for text representation according to which a text 
document dj is represented as a vector of binary or real weights. 
underlying model for text representation 
 T is the set of terms that occur at least once in at least one document of the 
collection Tr. 
 wkj є [0,1] represents how much term tk contributes to the semantics of 
document dj.
 RBFN Model 
 RFBNs have a single hidden layer of processing units with local, restricted 
activation domain: A Gaussian function is commonly used. 
 RBFN main advantages are that classification function is nonlinear, the model 
may produce confidence values and it may be robust to outliers. 
 Drawbacks are the potential sensitivity to input parameters, and potential 
overtraining sensitivity.
A system to filter unwanted messages from OSN user walls
 Creator specification 
A creator specification creatorSpec implicitly denotes a set of OSN users. It can 
have following forms- 
 A set of attribute constraints of the form an OP av 
 A set of relationship constraints of the form (m, rt, minDepth, maxTrust) 
 Filtering Rule 
A filtering rule FR is a tuple (author, creatorSpec, contentSpec, action)
 Black Lists 
A BL rule is a tuple (author, creatorSpec, creatorBehavior, T) 
 author is the OSN user who specifies the rule, i.e., the wall owner; 
 creatorSpec is a creator specification, specified according to Definition 1; 
 creatorBehavior consists of two components RFBlocked and minBanned. 
RFBlocked = (RF, mode, window) 
minBanned = (min, mode, window) 
 T denotes the time period the users identified by creatorSpec and 
creatorBehavior have to be banned from author wall.
A system to filter unwanted messages from OSN user walls
 The short message goes in user’s filtering wall and checked using the filtering rules 
defined by the user. 
 According to the user defined filtering rules, it is labeled as the class in it resides. 
 Then the gradual value of message is compared with the system defined threshold 
value. 
 If message crosses the threshold value then it goes to block list. Otherwise it is posted 
to user’s wall.
 Evaluation Metrics 
 Two different types of measures will be used to evaluate the effectiveness of first-level 
and second-level classifications. 
 In the first level, the short text classification procedure is evaluated on the basis of the 
contingency table approach. 
 At second level, measures Precision (P) that permits to evaluate the number of false 
positives, Recall (R), that permits to evaluate the number of false negatives, and the 
overall metric F-measure (F β) defined as the harmonic mean between the above two 
indexes.
 Overall Performance 
 The blacklist guarantees 100% filtering of messages 
coming from suspicious sources. 
 The process of detecting and filtering spam is transparent, 
regulated by standards and fairly reliable. 
 Flexibility, and the possibility to fine-tune the settings. 
Rarely make mistakes in distinguishing spam from 
legitimate messages.
 DicomFW 
 DicomFW is the GUI of this study work. It is a prototype Facebook application. 
 The main focus is on implementation of Filtering Rules throughout the 
implementation. 
 This application permits to- 
1. View the list of users’ FilteringWalls; 
2. View messages and post a new one on a FilteringWalls; 
3. Define Filtering Rules using the OSA tool.
 In this whole study work, a system to filter undesired messages from Online Social 
Network walls is presented. 
 The system exploits a Machine Learning soft classifier to enforce customizable 
content-dependent Filtering Rules. 
 The flexibility of the system in terms of filtering options is enhanced through the 
management of Black Lists. 
 The aim behind this work is to investigate a tool able to automatically recommend 
trust values for those contacts user does not personally known.
[1] M. Vanetti, E. Binaghi, B. Carminati, M. Carullo, and E. Ferrari, “Content-Based Filtering in On- 
Line Social Networks,” Proc. ECML/PKDD Workshop Privacy and Security Issues in Data Mining and 
Machine Learning (PSDML ’10), 2010. 
[2] Y. Zhang and J. Callan, “Maximum Likelihood Estimation for Filtering Thresholds,” Proc. 24th Ann. 
Int’l ACM SIGIR Conf. Research and Development in Information Retrieval, pp. 294-302, 2001. 
[3] M. Carullo, E. Binaghi, and I. Gallo, “An Online Document Clustering Technique for Short Web 
Contents,” Pattern Recognition Letters, vol. 30, pp. 870-876, July 2009. 
[4] M. Carullo, E. Binaghi, I. Gallo, and N. Lamberti, “Clustering of Short Commercial Documents for 
the Web,” Proc. 19th Int’l Conf. Pattern Recognition (ICPR ’08), 2008. 
[5] C.D. Manning, P. Raghavan, and H. Schu ¨tze, Introduction to Information Retrieval. Cambridge 
Univ. Press, 2008.
[6] J. Moody and C. Darken, “Fast Learning in Networks of LocallyTuned Processing Units,” Neural 
Computation, vol. 1, no. 2, pp. 281-294, 1989. 
[7] M.J.D. Powell, “Radial Basis Functions for Multivariable Interpolation: A Review,” Algorithms for 
Approximation, pp. 143-167, Clarendon Press, 1987. 
[8] J. Park and I.W. Sandberg, “Approximation and Radial-BasisFunction Networks,” Neural 
Computation, vol. 5, pp. 305-316, 1993. 
[9] C. Cleverdon, “Optimizing Convenient Online Access to Bibliographic Databases,” Information 
Services and Use, vol. 4, no. 1, pp. 37-47, 1984. 
[10] J.A. Golbeck, “Computing and Applying Trust in Web-Based Social Networks,” PhD dissertation, 
Graduate School of the Univ. of Maryland, College Park, 2005.
A system to filter unwanted messages from OSN user walls
A system to filter unwanted messages from OSN user walls

More Related Content

PPTX
A system to filter unwanted messages from the
DOCX
Online Examination System Report
DOCX
Report on online voting system
DOCX
Crime Reporting System
PDF
online Examination System (project report)
PDF
PDF
Handwritten Text Recognition and Digital Text Conversion
PDF
INFORMATION TECHNOLOGY (2016)- SEM_VI - PRACTICAL (SLIP) QUESTIONS
A system to filter unwanted messages from the
Online Examination System Report
Report on online voting system
Crime Reporting System
online Examination System (project report)
Handwritten Text Recognition and Digital Text Conversion
INFORMATION TECHNOLOGY (2016)- SEM_VI - PRACTICAL (SLIP) QUESTIONS

What's hot (20)

DOCX
Synopsis on Online examination system using php
PDF
ITX3999 - Restaurant Management System Disseration.compressed (1)-ilovepdf-co...
PPTX
Routine Management System of Ahsanullah University of Science & Technology (...
PDF
WECON V-BOX Lua Configration
DOCX
Online Exam Management System(OEMS)
PPTX
Online exam management system
PDF
Student Management System
DOCX
SRS for online examination system
PDF
Emotion based music player
PDF
Library_Management_System_Mini_Project_R (1).pdf
PPTX
Railway Reservation System.pptx
PDF
Online Exam System_Industrial Report
PDF
WEB DEVELOPMENT
PDF
Use case of course registration system using LaTex
PPTX
Online Examination System
PPTX
Student result mamagement
PDF
Online Examination System in .NET & DB2
PDF
admmission2018
PDF
Documentation e-voting Software Engineering
PPTX
Online Voting System Project Proposal ( Presentation Slide).pptx
Synopsis on Online examination system using php
ITX3999 - Restaurant Management System Disseration.compressed (1)-ilovepdf-co...
Routine Management System of Ahsanullah University of Science & Technology (...
WECON V-BOX Lua Configration
Online Exam Management System(OEMS)
Online exam management system
Student Management System
SRS for online examination system
Emotion based music player
Library_Management_System_Mini_Project_R (1).pdf
Railway Reservation System.pptx
Online Exam System_Industrial Report
WEB DEVELOPMENT
Use case of course registration system using LaTex
Online Examination System
Student result mamagement
Online Examination System in .NET & DB2
admmission2018
Documentation e-voting Software Engineering
Online Voting System Project Proposal ( Presentation Slide).pptx
Ad

Viewers also liked (20)

DOCX
A system to filter unwanted messages from osn user walls
PPTX
seminar on To block unwanted messages _from osn
PDF
A system to filter unwanted messages
PDF
Content Based Message Filtering For OSNS Using Machine Learning Classifier
PDF
Filter unwanted messages from walls and blocking non legitimate users in osn
PPTX
ONLINE SOCIAL NETWORK
PPTX
Identifying features in opinion mining via intrinsic and extrinsic domain rel...
PDF
Designing a Prosthetic Memory for Software Developers
PPTX
NYMBLE BLOCKING
PPTX
String matching algorithms(knuth morris-pratt)
PDF
Scalable sentiment classification for big data analysis using naive bayes cla...
PPTX
Data preprocessing
PPTX
Vertex cover Problem
PPTX
Web content mining
PPTX
Rabin karp string matching algorithm
PPTX
Image Classification And Support Vector Machine
PPTX
Sentiment analysis using naive bayes classifier
PPT
Support Vector Machines
PDF
Support Vector Machines for Classification
PPTX
A system to filter unwanted messages from osn user walls
seminar on To block unwanted messages _from osn
A system to filter unwanted messages
Content Based Message Filtering For OSNS Using Machine Learning Classifier
Filter unwanted messages from walls and blocking non legitimate users in osn
ONLINE SOCIAL NETWORK
Identifying features in opinion mining via intrinsic and extrinsic domain rel...
Designing a Prosthetic Memory for Software Developers
NYMBLE BLOCKING
String matching algorithms(knuth morris-pratt)
Scalable sentiment classification for big data analysis using naive bayes cla...
Data preprocessing
Vertex cover Problem
Web content mining
Rabin karp string matching algorithm
Image Classification And Support Vector Machine
Sentiment analysis using naive bayes classifier
Support Vector Machines
Support Vector Machines for Classification
Ad

Similar to A system to filter unwanted messages from OSN user walls (20)

PPTX
OSN (new) ppt for optimised neural network and formation
PPTX
OSN for neural network and the coomunication network
PDF
Iaetsd hierarchical fuzzy rule based classification
PDF
Iaetsd efficient filteration of unwanted messages
PDF
Filter unwanted messages from walls and blocking nonlegitimate user in osn
PDF
Filter unwanted messages from walls and blocking nonlegitimate user in osn
PDF
Rule based messege filtering and blacklist management for online social network
DOCX
A system to filter unwanted messages from osn user walls
PDF
Paper id 152013128
PDF
Cb4301449454
PDF
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
PDF
D0351020025
PDF
An automatic filtering task in osn using content based approach
PDF
PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...
PDF
S180304116124
PDF
Predicting the success of altruistic requests
PPTX
CYBER BULLYING DETECTION UPDATED USING social
PDF
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
PDF
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
PDF
Recommender Systems with Implicit Feedback Challenges, Techniques, and Applic...
OSN (new) ppt for optimised neural network and formation
OSN for neural network and the coomunication network
Iaetsd hierarchical fuzzy rule based classification
Iaetsd efficient filteration of unwanted messages
Filter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osn
Rule based messege filtering and blacklist management for online social network
A system to filter unwanted messages from osn user walls
Paper id 152013128
Cb4301449454
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
D0351020025
An automatic filtering task in osn using content based approach
PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...
S180304116124
Predicting the success of altruistic requests
CYBER BULLYING DETECTION UPDATED USING social
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Recommender Systems with Implicit Feedback Challenges, Techniques, and Applic...

Recently uploaded (20)

PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
GDM (1) (1).pptx small presentation for students
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
Lesson notes of climatology university.
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Complications of Minimal Access Surgery at WLH
PDF
Basic Mud Logging Guide for educational purpose
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Anesthesia in Laparoscopic Surgery in India
PPH.pptx obstetrics and gynecology in nursing
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
GDM (1) (1).pptx small presentation for students
STATICS OF THE RIGID BODIES Hibbelers.pdf
Lesson notes of climatology university.
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
VCE English Exam - Section C Student Revision Booklet
human mycosis Human fungal infections are called human mycosis..pptx
Abdominal Access Techniques with Prof. Dr. R K Mishra
Microbial disease of the cardiovascular and lymphatic systems
Complications of Minimal Access Surgery at WLH
Basic Mud Logging Guide for educational purpose
102 student loan defaulters named and shamed – Is someone you know on the list?
O5-L3 Freight Transport Ops (International) V1.pdf

A system to filter unwanted messages from OSN user walls

  • 1. A System to Filter Unwanted Messages from OSN User Walls Presented By: Gajanand Sharma M. E. Scholar UVCE Bangalore Guided By: Ms. Vandana Jha Ph. D. Scholar UVCE Bangalore
  • 2.  Introduction  Related Work  Model  Algorithm  Implementation  Performance  Conclusion  Bibliography
  • 3.  The underlying issue in today’s Online Social Networks is to give users the ability to control the messages posted on their own timeline.  Online Social Networks provide a little support to this necessity.  The proposed system allows users to have a direct control on their timeline posts.  This is achieved by using a flexible rule based system allowing users to customize the filtering criteria.
  • 4.  Online Social Networks are one of the most popular medium for communication, sharing and broadcasting the human life information.  Due to huge and dynamic character of data, web content mining strategies are assumed to automatically discover the useful information from the data.  In OSNs this strategy is used to filter and remove unwanted posts on the user walls.  It can be implemented using ad - hoc classification strategies because wall messages contain short text for which traditional classification methods do not work.
  • 5.  So the aim of proposed system is to evaluate an automated system able to filter unwanted messages form user walls.  Machine Learning text categorization techniques are used to automatically assign with each short text message a set of categories based on its content.  By using this technique, short messages are categorized into neutral and non-neutral. Then Non-neutral messages are further classified into different categories.  By using Filtering Rules, users can state what contents should not be displayed on their walls.  Filtering Rules exploit user profiles, user relationships as well as the output of the Machine Learning categorization process to state the filtering criteria to be enforced.
  • 6.  The system also provides the support for user-defined Black-Lists. i.e., lists of users that are temporarily prevented to post any kind of messages on a user wall.
  • 7.  N.J. Belkin and W.B. Croft, introduced Information filtering system, in “Information Filtering and Information Retrieval: Two Sides of the Same Coin?”  P.J. Denning, introduced content based filtering system in paper entitled “Electronic Junk,”  P.W. Foltz and S.T. Dumais, also discussed information filtering system in the paper “Personalized Information Delivery: An Analysis of Information Filtering Methods,”  M. Vanetti, E. Binaghi, B. Carminati, M. Carullo, and E. Ferrari, given the concept of content based filtering in the paper “Content-Based Filtering in On-Line Social Networks,”
  • 8.  The architecture in support of OSN services is a three-tier structure. 1. Social Network Manager (SNM) -Aims to provide the basic OSN functionalities… 2. Social Network Applications (SNAs) -Provides the support for external Social Network Applications… 3. Graphical User Interfaces (GUIs) -GUI to set up and manage FRs/ BLs by users…
  • 10. Information Filtering OSN Policy-based Personalization Short Text Classification
  • 11.  Information filtering  Information filtering can be used for a different, more sensitive, purpose. This is due to the fact that in OSNs there is the possibility of posting or commenting other posts on particular public/private areas, called in general walls.  Information filtering can therefore be used to give users the ability to automatically control the messages written on their own walls, by filtering out unwanted messages.
  • 12.  Short Text Classifier  It is something like first identifying Neutral sentences, then classifying Non-neutral sentences…  First level task is somehow hard task i.e. labeling massage sentences Neutral or Non- Neutral…  In second level non-neutral sentences are further classified into different classes…  The second level soft classifier produces a gradual membership for each non-neutral sentence…
  • 13.  Policy based Personalization  A classification method has been proposed to categorize short text messages in order to avoid overwhelming users of microblogging services by raw data.  Filtering policy language allows the setting of FRs according to a variety of criteria, that do not consider only the results of the classification process but also the relationships of the wall owner with other OSN users as well as information on the user profile.
  • 14. Vector Space Model  This is the underlying model for text representation according to which a text document dj is represented as a vector of binary or real weights. underlying model for text representation  T is the set of terms that occur at least once in at least one document of the collection Tr.  wkj є [0,1] represents how much term tk contributes to the semantics of document dj.
  • 15.  RBFN Model  RFBNs have a single hidden layer of processing units with local, restricted activation domain: A Gaussian function is commonly used.  RBFN main advantages are that classification function is nonlinear, the model may produce confidence values and it may be robust to outliers.  Drawbacks are the potential sensitivity to input parameters, and potential overtraining sensitivity.
  • 17.  Creator specification A creator specification creatorSpec implicitly denotes a set of OSN users. It can have following forms-  A set of attribute constraints of the form an OP av  A set of relationship constraints of the form (m, rt, minDepth, maxTrust)  Filtering Rule A filtering rule FR is a tuple (author, creatorSpec, contentSpec, action)
  • 18.  Black Lists A BL rule is a tuple (author, creatorSpec, creatorBehavior, T)  author is the OSN user who specifies the rule, i.e., the wall owner;  creatorSpec is a creator specification, specified according to Definition 1;  creatorBehavior consists of two components RFBlocked and minBanned. RFBlocked = (RF, mode, window) minBanned = (min, mode, window)  T denotes the time period the users identified by creatorSpec and creatorBehavior have to be banned from author wall.
  • 20.  The short message goes in user’s filtering wall and checked using the filtering rules defined by the user.  According to the user defined filtering rules, it is labeled as the class in it resides.  Then the gradual value of message is compared with the system defined threshold value.  If message crosses the threshold value then it goes to block list. Otherwise it is posted to user’s wall.
  • 21.  Evaluation Metrics  Two different types of measures will be used to evaluate the effectiveness of first-level and second-level classifications.  In the first level, the short text classification procedure is evaluated on the basis of the contingency table approach.  At second level, measures Precision (P) that permits to evaluate the number of false positives, Recall (R), that permits to evaluate the number of false negatives, and the overall metric F-measure (F β) defined as the harmonic mean between the above two indexes.
  • 22.  Overall Performance  The blacklist guarantees 100% filtering of messages coming from suspicious sources.  The process of detecting and filtering spam is transparent, regulated by standards and fairly reliable.  Flexibility, and the possibility to fine-tune the settings. Rarely make mistakes in distinguishing spam from legitimate messages.
  • 23.  DicomFW  DicomFW is the GUI of this study work. It is a prototype Facebook application.  The main focus is on implementation of Filtering Rules throughout the implementation.  This application permits to- 1. View the list of users’ FilteringWalls; 2. View messages and post a new one on a FilteringWalls; 3. Define Filtering Rules using the OSA tool.
  • 24.  In this whole study work, a system to filter undesired messages from Online Social Network walls is presented.  The system exploits a Machine Learning soft classifier to enforce customizable content-dependent Filtering Rules.  The flexibility of the system in terms of filtering options is enhanced through the management of Black Lists.  The aim behind this work is to investigate a tool able to automatically recommend trust values for those contacts user does not personally known.
  • 25. [1] M. Vanetti, E. Binaghi, B. Carminati, M. Carullo, and E. Ferrari, “Content-Based Filtering in On- Line Social Networks,” Proc. ECML/PKDD Workshop Privacy and Security Issues in Data Mining and Machine Learning (PSDML ’10), 2010. [2] Y. Zhang and J. Callan, “Maximum Likelihood Estimation for Filtering Thresholds,” Proc. 24th Ann. Int’l ACM SIGIR Conf. Research and Development in Information Retrieval, pp. 294-302, 2001. [3] M. Carullo, E. Binaghi, and I. Gallo, “An Online Document Clustering Technique for Short Web Contents,” Pattern Recognition Letters, vol. 30, pp. 870-876, July 2009. [4] M. Carullo, E. Binaghi, I. Gallo, and N. Lamberti, “Clustering of Short Commercial Documents for the Web,” Proc. 19th Int’l Conf. Pattern Recognition (ICPR ’08), 2008. [5] C.D. Manning, P. Raghavan, and H. Schu ¨tze, Introduction to Information Retrieval. Cambridge Univ. Press, 2008.
  • 26. [6] J. Moody and C. Darken, “Fast Learning in Networks of LocallyTuned Processing Units,” Neural Computation, vol. 1, no. 2, pp. 281-294, 1989. [7] M.J.D. Powell, “Radial Basis Functions for Multivariable Interpolation: A Review,” Algorithms for Approximation, pp. 143-167, Clarendon Press, 1987. [8] J. Park and I.W. Sandberg, “Approximation and Radial-BasisFunction Networks,” Neural Computation, vol. 5, pp. 305-316, 1993. [9] C. Cleverdon, “Optimizing Convenient Online Access to Bibliographic Databases,” Information Services and Use, vol. 4, no. 1, pp. 37-47, 1984. [10] J.A. Golbeck, “Computing and Applying Trust in Web-Based Social Networks,” PhD dissertation, Graduate School of the Univ. of Maryland, College Park, 2005.