A Two-step Approach for Effective Detection of Misbehaving Users in Chats

نویسندگان

  • Esaú Villatoro-Tello
  • Antonio Juárez-González
  • Hugo Jair Escalante
  • Manuel Montes-y-Gómez
  • Luis Villaseñor Pineda
چکیده

This paper describes the system jointly developed by the Language Technologies Lab from INAOE and the Language and Reasoning Group from UAM for the Sexual Predators Identification task at the PAN 2012. The presented system focuses on the problem of identifying sexual predators in a set of suspicious chatting. It is mainly based on the following hypotheses: (i) terms used in the process of child exploitation are categorically and psychologically different than terms used in general chatting; and (ii) predators usually apply the same course of conduct pattern when they are approaching a child. Based on these hypotheses, our participation at the PAN 2012 aimed to demonstrate that it is possible to train a classifier to learn those particular terms that turn a chat conversation into a case of online child exploitation; and, that it is also possible to learn the behavioral patters of predators during a chat conversation allowing us to accurately distinguish victims from predators.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

سناریونویسی برای شرایط اضطراری مبتنی بر رویکرد دانش بدنه مدیریت پروژه

Background & Objectives : The sound planning is needed for effective implementation of an emergency exercise. The exercise planning is manifested in the scenario development process. Despite the frequent execution of exercises in the industries and the public domain, there is no uniform pattern for designing scenarios. The present paper aims at devising a new pattern based on the project manage...

متن کامل

A Knowledge Management Approach to Discovering Influential Users in Social Media

A key step for success of marketer is to discover influential users who diffuse information and their followers have interest to this information and increase to diffuse information on social media. They can reduce the cost of advertising, increase sales and maximize diffusion of information.  A key problem is how to precisely identify the most influential users on social networks. In this pape...

متن کامل

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

متن کامل

A two-step method for damage identification and quantification in large trusses via wavelet transform and optimization algorithm

In the present study, a two-step approach for damage prognosis in long trusses is suggested in which the first step deals with locating probable damages by wavelet transform (WT) and static deflection derived from modal data with the intention of declining the subsequent inverse problem variables. Then, in the second step, optimization based model updating method using Artificial Bee Colony (AB...

متن کامل

A New Model for Email Spam Detection using Hybrid of Magnetic Optimization Algorithm with Harmony Search Algorithm

Unfortunately, among internet services, users are faced with several unwanted messages that are not even related to their interests and scope, and they contain advertising or even malicious content. Spam email contains a huge collection of infected and malicious advertising emails that harms data destroying and stealing personal information for malicious purposes. In most cases, spam emails con...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012