SlideShare a Scribd company logo
A System To Filter
Unwanted Messages
From The OSN User
Walls
Presented by DINESH GANAPATHI
Under The Guidance of Dr. T.SWARNA LATHA
Outline
• Introduction
• Related Work
• Filtered Wall Architecture
• Filtering Rules & Blacklist Management
Introduction
 On-line Social Networks (OSNs) are today one of the most popular interactive medium to
communicate, share and disseminate a considerable amount of human life information. Daily
and continuous communications imply the exchange of several types of content, including free
text, image, audio and video data.
 whereas more than 30 billion pieces of content (web links, news stories, blog posts, notes,
photo albums, etc.) are shared each month.
A system to filter unwanted messages from the
Problem Raised
For example, Facebook allows users to state who is allowed to insert messages in
their walls (i.e., friends, friends of friends, or defined groups of friends).
However, no content-based preferences are supported and therefore it is not
possible to prevent undesired messages, such as political or vulgar ones, no matter
of the user who posts them.
Information
Filtering

OSN
Short Text
Classification

Policy-based
Personalization
Information Filtering
 Information filtering can also be used for a different,
more sensitive, purpose. This is due to the fact that in
OSNs there is the possibility of posting or commenting
other posts on particular public/private areas, called in
general walls.
 Information filtering can therefore be used to give users
the ability to automatically control the messages written
on their own walls, by filtering out unwanted messages.
Short Text Classification
The major efforts in building a robust short text classifier are concentrated in
the extraction and selection of a set of characterizing and discriminant
features. The original set of features, derived from endogenous properties of
short texts, is enlarged here including exogenous knowledge related to the
context from which the messages originate. As far as the learning model is
concerned, we confirm in the current paper the use of neural learning which is
today recognized as one of the most efficient solutions in text classification [4].
In particular, we base the overall short text classification strategy on Radial
Basis Function Networks (RBFN) for their proven capabilities in acting as soft
classifiers, in managing noisy data and intrinsically vague classes.
Policy-based Personalization
A classification method has been proposed to categorize short text messages in
order to avoid overwhelming users of microblogging services by raw data. The
system focuses on Twitter2 and associates a set of categories with each tweet
describing its content. The user can then view only certain types of tweets
based on his/her interests. In contrast, Golbeck and Kuter propose an
application, called FilmTrust, that exploits OSN trust relationships and
provenance information to personalize access to the website. However, such
systems do not provide a filtering policy layer by which the user can exploit the
result of the classification process to decide how and to which extent filtering
out unwanted information. In contrast, our filtering policy language allows the
setting of FRs according to a variety of criteria, that do not consider only the
results of the classification process but also the relationships of the wall owner
with other OSN users as well as information on the user profile.
Modules
Filtering Rules
we consider three main issues that, in our
opinion, should affect a message filtering
decision. First of all, in OSNs like in
everyday life, the same message may
have different meanings and relevance
based on who writes it. As a consequence,
FRs should allow users to state
constraints on message creators. Creators
on which a FR applies can be selected on
the basis of several different criteria; one
of the most relevant is by imposing
conditions on their profile’s attributes. In
such a way it is, for instance, possible to
define rules applying only to young
creators or to creators with a given
religious/political view. Given the social
network scenario, creators may also be
identified by exploiting information on
their social graph. This implies to state
conditions on type, depth and trust
values of the relationship(s) creators
should be involved in order to apply
them the specified rules

OL Setup for FR’sThresholds

Blacklist

OSA presents the user with a set of
messages selected from the dataset
discussed in Section VI-A. For each
message, the user tells the system the
decision to accept or reject the
message. The collection and processing
of user decisions on an adequate set of
messages distributed over all the
classes allows to compute customized
thresholds representing the user
attitude in accepting or rejecting
certain contents. Such messages are
selected according to the following
process. A certain amount of non
neutral messages taken from a fraction
of the dataset and not belonging to the
training/test sets, are classified by the
ML in order to have, for each message,
the second level class membership
values

A further component of our system is a
BL mechanism to avoid messages from
undesired creators, independent from
their contents. BLs are directly
managed by the system, which should
be able to determine who are the users
to be inserted in the BL and decide
when users retention in the BL is
finished. To enhance flexibility, such
information
are given to the system through a set of
rules, hereafter called BL rules. Such
rules are not defined by the SNM,
therefore they are not meant as general
high level directives to be applied to
the whole community. Rather, we
decide to let the users themselves, i.e.,
the wall’s owners to specify BL rules
regulating who has to be banned from
their walls and for how long. Therefore,
a user might be banned from a wall, by,
at the same time, being able to post in
other walls
Present Architecture
 The architecture in support of OSN services is
a two-tier Structure.
 Graphical User Interfaces
 Social Network Manager
Proposed New Architecture
 The architecture in support of OSN services is a threetier Structure.
1. The first layer, called Social Network Manager (SNM),
commonly aims to provide the basic OSN functionalities (i.e.,
profile and relationship management).
2. The second layer provides the support for external Social
Network Applications (SNAs).
3. The supported SNAs may in turn require an additional layer for
their needed Graphical User Interfaces (GUIs).
Filtering System

Words

Blacklist

Violence

Vulgarity

Sexually
Explicit

Post
A system to filter unwanted messages from the
Advantages
1

The blacklist guarantees 100% filtering of messages coming from
suspicious sources.

2

The process of detecting and filtering spam is transparent,
regulated by standards and fairly reliable.

3

Flexibility, and the possibility to fine-tune the settings. Rarely
make mistakes in distinguishing spam from legitimate messages.

4

Automatically Done.

5

Individual setting.
Title and Content Layout with Chart

6
5
4
3
2
1

0
Category 1

Category 2
Series 1

Category 3
Series 2

Series 3

Category 4
Two Content Layout with Table
• First bullet point here
• Second bullet point here
• Third bullet point here

Group A

Group B

Class 1

82

95

Class 2

76

88

Class 3

84

90
A system to filter unwanted messages from the
Group
A

Group
D

Group
Title

Group
C

Group
B
A system to filter unwanted messages from the
A system to filter unwanted messages from the
A system to filter unwanted messages from the

More Related Content

PPTX
Result processing system (Project)
PDF
Tech Talk: ONOS- A Distributed SDN Network Operating System
PDF
Packet Tracer Simulation Lab Layer 2 Switching
DOCX
Enterprise network
PPTX
A system to filter unwanted messages from OSN user walls
DOCX
A system to filter unwanted messages from osn user walls
PPTX
seminar on To block unwanted messages _from osn
Result processing system (Project)
Tech Talk: ONOS- A Distributed SDN Network Operating System
Packet Tracer Simulation Lab Layer 2 Switching
Enterprise network
A system to filter unwanted messages from OSN user walls
A system to filter unwanted messages from osn user walls
seminar on To block unwanted messages _from osn

Viewers also liked (20)

PDF
A system to filter unwanted messages
PDF
Filter unwanted messages from walls and blocking non legitimate users in osn
PDF
Content Based Message Filtering For OSNS Using Machine Learning Classifier
PPTX
ONLINE SOCIAL NETWORK
PDF
EPAS: A SAMPLING BASED SIMILARITY IDENTIFICATION ALGORITHM FOR THE CLOUD
PPTX
Content based filtering
PPTX
NYMBLE BLOCKING
PDF
Designing a Prosthetic Memory for Software Developers
PPTX
Decentralized access control with anonymous authentication of data stored in ...
PPTX
Identifying features in opinion mining via intrinsic and extrinsic domain rel...
PDF
Geometric range search on encrypted spatial data
DOCX
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES - I...
DOCX
Privacy policy inference of user uploaded
PDF
Recommender system introduction
PPTX
PPTX
Lifi Technology
PPTX
Li-Fi
PPTX
Li-fi technology
PPTX
Hotel Management System
PPT
Lifi ppt
A system to filter unwanted messages
Filter unwanted messages from walls and blocking non legitimate users in osn
Content Based Message Filtering For OSNS Using Machine Learning Classifier
ONLINE SOCIAL NETWORK
EPAS: A SAMPLING BASED SIMILARITY IDENTIFICATION ALGORITHM FOR THE CLOUD
Content based filtering
NYMBLE BLOCKING
Designing a Prosthetic Memory for Software Developers
Decentralized access control with anonymous authentication of data stored in ...
Identifying features in opinion mining via intrinsic and extrinsic domain rel...
Geometric range search on encrypted spatial data
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES - I...
Privacy policy inference of user uploaded
Recommender system introduction
Lifi Technology
Li-Fi
Li-fi technology
Hotel Management System
Lifi ppt
Ad

Similar to A system to filter unwanted messages from the (20)

PPTX
OSN for neural network and the coomunication network
PDF
Paper id 152013128
PDF
PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...
PDF
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
PDF
Iaetsd efficient filteration of unwanted messages
PDF
Filter unwanted messages from walls and blocking nonlegitimate user in osn
PDF
Filter unwanted messages from walls and blocking nonlegitimate user in osn
PPTX
OSN (new) ppt for optimised neural network and formation
DOCX
A system to filter unwanted messages from osn user walls
PDF
Iaetsd hierarchical fuzzy rule based classification
PDF
An automatic filtering task in osn using content based approach
PDF
Rule based messege filtering and blacklist management for online social network
PDF
Cb4301449454
PDF
S180304116124
PDF
D0351020025
PDF
Introduction to the open rights group censorship monitoring project
PDF
Classification Methods for Spam Detection in Online Social Network
PDF
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
PDF
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
PDF
Predicting the success of altruistic requests
OSN for neural network and the coomunication network
Paper id 152013128
PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
Iaetsd efficient filteration of unwanted messages
Filter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osn
OSN (new) ppt for optimised neural network and formation
A system to filter unwanted messages from osn user walls
Iaetsd hierarchical fuzzy rule based classification
An automatic filtering task in osn using content based approach
Rule based messege filtering and blacklist management for online social network
Cb4301449454
S180304116124
D0351020025
Introduction to the open rights group censorship monitoring project
Classification Methods for Spam Detection in Online Social Network
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Predicting the success of altruistic requests
Ad

More from Madan Golla (9)

PPTX
PPTX
Optimizing cloud resources for delivering iptv services through virtualization
PPT
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
PPTX
Emap expedite message authentication protocol for vehicular ad hoc networks
PPTX
Document clustering for forensic analysis an approach for improving compute...
PPTX
Collaboration in multi cloud computing environments framework and security is...
PPTX
Cloud mo v
PPTX
Cloud computing for mobile users can offloading computation save energy
PPTX
A generalized flow based method for analysis of implicit
Optimizing cloud resources for delivering iptv services through virtualization
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
Emap expedite message authentication protocol for vehicular ad hoc networks
Document clustering for forensic analysis an approach for improving compute...
Collaboration in multi cloud computing environments framework and security is...
Cloud mo v
Cloud computing for mobile users can offloading computation save energy
A generalized flow based method for analysis of implicit

Recently uploaded (20)

PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
Lesson notes of climatology university.
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Pre independence Education in Inndia.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
RMMM.pdf make it easy to upload and study
PPTX
master seminar digital applications in india
PDF
Complications of Minimal Access Surgery at WLH
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
GDM (1) (1).pptx small presentation for students
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Lesson notes of climatology university.
Anesthesia in Laparoscopic Surgery in India
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Abdominal Access Techniques with Prof. Dr. R K Mishra
2.FourierTransform-ShortQuestionswithAnswers.pdf
VCE English Exam - Section C Student Revision Booklet
Microbial diseases, their pathogenesis and prophylaxis
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Module 4: Burden of Disease Tutorial Slides S2 2025
Pre independence Education in Inndia.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
RMMM.pdf make it easy to upload and study
master seminar digital applications in india
Complications of Minimal Access Surgery at WLH
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
GDM (1) (1).pptx small presentation for students
Renaissance Architecture: A Journey from Faith to Humanism

A system to filter unwanted messages from the

  • 1. A System To Filter Unwanted Messages From The OSN User Walls Presented by DINESH GANAPATHI Under The Guidance of Dr. T.SWARNA LATHA
  • 2. Outline • Introduction • Related Work • Filtered Wall Architecture • Filtering Rules & Blacklist Management
  • 3. Introduction  On-line Social Networks (OSNs) are today one of the most popular interactive medium to communicate, share and disseminate a considerable amount of human life information. Daily and continuous communications imply the exchange of several types of content, including free text, image, audio and video data.  whereas more than 30 billion pieces of content (web links, news stories, blog posts, notes, photo albums, etc.) are shared each month.
  • 5. Problem Raised For example, Facebook allows users to state who is allowed to insert messages in their walls (i.e., friends, friends of friends, or defined groups of friends). However, no content-based preferences are supported and therefore it is not possible to prevent undesired messages, such as political or vulgar ones, no matter of the user who posts them.
  • 7. Information Filtering  Information filtering can also be used for a different, more sensitive, purpose. This is due to the fact that in OSNs there is the possibility of posting or commenting other posts on particular public/private areas, called in general walls.  Information filtering can therefore be used to give users the ability to automatically control the messages written on their own walls, by filtering out unwanted messages.
  • 8. Short Text Classification The major efforts in building a robust short text classifier are concentrated in the extraction and selection of a set of characterizing and discriminant features. The original set of features, derived from endogenous properties of short texts, is enlarged here including exogenous knowledge related to the context from which the messages originate. As far as the learning model is concerned, we confirm in the current paper the use of neural learning which is today recognized as one of the most efficient solutions in text classification [4]. In particular, we base the overall short text classification strategy on Radial Basis Function Networks (RBFN) for their proven capabilities in acting as soft classifiers, in managing noisy data and intrinsically vague classes.
  • 9. Policy-based Personalization A classification method has been proposed to categorize short text messages in order to avoid overwhelming users of microblogging services by raw data. The system focuses on Twitter2 and associates a set of categories with each tweet describing its content. The user can then view only certain types of tweets based on his/her interests. In contrast, Golbeck and Kuter propose an application, called FilmTrust, that exploits OSN trust relationships and provenance information to personalize access to the website. However, such systems do not provide a filtering policy layer by which the user can exploit the result of the classification process to decide how and to which extent filtering out unwanted information. In contrast, our filtering policy language allows the setting of FRs according to a variety of criteria, that do not consider only the results of the classification process but also the relationships of the wall owner with other OSN users as well as information on the user profile.
  • 10. Modules Filtering Rules we consider three main issues that, in our opinion, should affect a message filtering decision. First of all, in OSNs like in everyday life, the same message may have different meanings and relevance based on who writes it. As a consequence, FRs should allow users to state constraints on message creators. Creators on which a FR applies can be selected on the basis of several different criteria; one of the most relevant is by imposing conditions on their profile’s attributes. In such a way it is, for instance, possible to define rules applying only to young creators or to creators with a given religious/political view. Given the social network scenario, creators may also be identified by exploiting information on their social graph. This implies to state conditions on type, depth and trust values of the relationship(s) creators should be involved in order to apply them the specified rules OL Setup for FR’sThresholds Blacklist OSA presents the user with a set of messages selected from the dataset discussed in Section VI-A. For each message, the user tells the system the decision to accept or reject the message. The collection and processing of user decisions on an adequate set of messages distributed over all the classes allows to compute customized thresholds representing the user attitude in accepting or rejecting certain contents. Such messages are selected according to the following process. A certain amount of non neutral messages taken from a fraction of the dataset and not belonging to the training/test sets, are classified by the ML in order to have, for each message, the second level class membership values A further component of our system is a BL mechanism to avoid messages from undesired creators, independent from their contents. BLs are directly managed by the system, which should be able to determine who are the users to be inserted in the BL and decide when users retention in the BL is finished. To enhance flexibility, such information are given to the system through a set of rules, hereafter called BL rules. Such rules are not defined by the SNM, therefore they are not meant as general high level directives to be applied to the whole community. Rather, we decide to let the users themselves, i.e., the wall’s owners to specify BL rules regulating who has to be banned from their walls and for how long. Therefore, a user might be banned from a wall, by, at the same time, being able to post in other walls
  • 11. Present Architecture  The architecture in support of OSN services is a two-tier Structure.  Graphical User Interfaces  Social Network Manager
  • 12. Proposed New Architecture  The architecture in support of OSN services is a threetier Structure. 1. The first layer, called Social Network Manager (SNM), commonly aims to provide the basic OSN functionalities (i.e., profile and relationship management). 2. The second layer provides the support for external Social Network Applications (SNAs). 3. The supported SNAs may in turn require an additional layer for their needed Graphical User Interfaces (GUIs).
  • 15. Advantages 1 The blacklist guarantees 100% filtering of messages coming from suspicious sources. 2 The process of detecting and filtering spam is transparent, regulated by standards and fairly reliable. 3 Flexibility, and the possibility to fine-tune the settings. Rarely make mistakes in distinguishing spam from legitimate messages. 4 Automatically Done. 5 Individual setting.
  • 16. Title and Content Layout with Chart 6 5 4 3 2 1 0 Category 1 Category 2 Series 1 Category 3 Series 2 Series 3 Category 4
  • 17. Two Content Layout with Table • First bullet point here • Second bullet point here • Third bullet point here Group A Group B Class 1 82 95 Class 2 76 88 Class 3 84 90