{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T05:21:54Z","timestamp":1761110514977,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030438869"},{"type":"electronic","value":"9783030438876"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-43887-6_22","type":"book-chapter","created":{"date-parts":[[2020,3,27]],"date-time":"2020-03-27T15:03:32Z","timestamp":1585321412000},"page":"283-297","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Categorizing Online Harassment on Twitter"],"prefix":"10.1007","author":[{"given":"Mozhgan","family":"Saeidi","sequence":"first","affiliation":[]},{"given":"Samuel Bruno","family":"da S. Sousa","sequence":"additional","affiliation":[]},{"given":"Evangelos","family":"Milios","sequence":"additional","affiliation":[]},{"given":"Norbert","family":"Zeh","sequence":"additional","affiliation":[]},{"given":"Lilian","family":"Berton","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,28]]},"reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Badjatiya, P., Gupta, S., Gupta, M., Varma, V.: Deep learning for hate speech detection in tweets. In: Proceedings of the 26th International Conference on World Wide Web Companion, pp. 759\u2013760. International World Wide Web Conferences Steering Committee (2017)","DOI":"10.1145\/3041021.3054223"},{"key":"22_CR2","doi-asserted-by":"publisher","unstructured":"Boser, B.E., Guyon, I.M., Vapnik, V.N.: A training algorithm for optimal margin classifiers. In: Proceedings of the Fifth Annual Workshop on Computational Learning Theory, COLT 1992, pp. 144\u2013152. ACM, New York (1992). https:\/\/doi.org\/10.1145\/130385.130401, http:\/\/doi.acm.org\/10.1145\/130385.130401","DOI":"10.1145\/130385.130401"},{"issue":"1","key":"22_CR3","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45(1), 5\u201332 (2001). https:\/\/doi.org\/10.1023\/A:1010933404324","journal-title":"Mach. Learn."},{"key":"22_CR4","unstructured":"Bretschneider, U., W\u00f6hner, T., Peters, R.: Detecting online harassment in social networks. In: Proceedings of the International Conference on Information Systems - Building a Better World through Information Systems, ICIS 2014, Auckland, New Zealand, 14\u201317 December 2014 (2014). http:\/\/aisel.aisnet.org\/icis2014\/proceedings\/ConferenceTheme\/2"},{"key":"22_CR5","doi-asserted-by":"publisher","first-page":"743","DOI":"10.1613\/jair.1.11259","volume":"63","author":"J Camacho-Collados","year":"2018","unstructured":"Camacho-Collados, J., Pilehvar, M.T.: From word to sense embeddings: a survey on vector representations of meaning. J. Artif. Intell. Res. 63, 743\u2013788 (2018)","journal-title":"J. Artif. Intell. Res."},{"key":"22_CR6","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: Smote: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321\u2013357 (2002)","journal-title":"J. Artif. Intell. Res."},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Chen, C.h.: Handbook of Pattern Recognition and Computer Vision. World Scientific, Singapore (2015)","DOI":"10.1142\/9503"},{"key":"22_CR8","unstructured":"Freund, Y., Schapire, R.E.: Experiments with a new boosting algorithm. In: Proceedings of the Thirteenth International Conference on International Conference on Machine Learning, ICML 1996, pp. 148\u2013156. Morgan Kaufmann Publishers Inc., San Francisco (1996). http:\/\/dl.acm.org\/citation.cfm?id=3091696.3091715"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Gamb\u00e4ck, B., Sikdar, U.K.: Using convolutional neural networks to classify hate-speech. In: Proceedings of the first workshop on abusive language online, pp. 85\u201390 (2017)","DOI":"10.18653\/v1\/W17-3013"},{"issue":"5","key":"22_CR10","first-page":"856","volume":"34","author":"CH Huang","year":"2011","unstructured":"Huang, C.H., Yin, J., Hou, F.: A text similarity measurement combining word semantic information with TF-IDF method. Jisuanji Xuebao (Chin. J. Comput.) 34(5), 856\u2013864 (2011)","journal-title":"Jisuanji Xuebao (Chin. J. Comput.)"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Jha, A., Mamidi, R.: When does a compliment become sexist? Analysis and classification of ambivalent sexism using twitter data. In: Proceedings of the Second Workshop on NLP and Computational Social Science, pp. 7\u201316 (2017)","DOI":"10.18653\/v1\/W17-2902"},{"issue":"1","key":"22_CR12","first-page":"1005","volume":"2","author":"P Kamavisdar","year":"2013","unstructured":"Kamavisdar, P., Saluja, S., Agrawal, S.: A survey on image classification approaches and techniques. Int. J. Adv. Res. Comput. Commun. Eng. 2(1), 1005\u20131009 (2013)","journal-title":"Int. J. Adv. Res. Comput. Commun. Eng."},{"issue":"1","key":"22_CR13","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1093\/bib\/bbk007","volume":"7","author":"P Larranaga","year":"2006","unstructured":"Larranaga, P., et al.: Machine learning in bioinformatics. Briefings in Bioinform. 7(1), 86\u2013112 (2006)","journal-title":"Briefings in Bioinform."},{"issue":"6","key":"22_CR14","first-page":"1462","volume":"57","author":"R Lewis","year":"2016","unstructured":"Lewis, R., Rowe, M., Wiper, C.: Online abuse of feminists as an emerging form of violence against women and girls. Br. J. Criminol. 57(6), 1462\u20131481 (2016)","journal-title":"Br. J. Criminol."},{"issue":"5","key":"22_CR15","doi-asserted-by":"publisher","first-page":"526","DOI":"10.1197\/jamia.M2051","volume":"13","author":"X Lu","year":"2006","unstructured":"Lu, X., Zheng, B., Velivelli, A., Zhai, C.: Enhancing text categorization with semantic-enriched representation and training data augmentation. J. Am. Med. Inform. Assoc. 13(5), 526\u2013535 (2006)","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"22_CR16","unstructured":"Mikolov, T., Chen, K., Corrado, G.S., Dean, J.: Efficient estimation of word representations in vector space. In: Proceedings of ICLR (2013)"},{"key":"22_CR17","volume-title":"Machine Learning","author":"TM Mitchell","year":"1997","unstructured":"Mitchell, T.M.: Machine Learning, 1st edn. McGraw-Hill Inc., New York (1997)","edition":"1"},{"key":"22_CR18","volume-title":"Introduction to Modern Information Retrieval","author":"G Salton","year":"1986","unstructured":"Salton, G., McGill, M.J.: Introduction to Modern Information Retrieval. McGraw-Hill Inc., New York (1986)"},{"key":"22_CR19","doi-asserted-by":"crossref","unstructured":"Sharifirad, S., Jafarpour, B., Matwin, S.: Boosting text classification performance on sexist tweets by text augmentation and text generation using a combination of knowledge graphs. In: Proceedings of the 2nd Workshop on Abusive Language Online (ALW2), pp. 107\u2013114. Association for Computational Linguistics, Brussels, October 2018. https:\/\/www.aclweb.org\/anthology\/W18-5114","DOI":"10.18653\/v1\/W18-5114"},{"key":"22_CR20","unstructured":"Sharifirad, S., Jafarpour, B., Matwin, S.: How is your mood when writing sexist tweets? Detecting the emotion type and intensity of emotion using natural language processing techniques. arXiv preprint arXiv:1902.03089 (2019)"},{"key":"22_CR21","unstructured":"Sharifirad, S., Matwin, S.: When a tweet is actually sexist. a more comprehensive classification of different online harassment categories and the challenges in NLP. arXiv preprint arXiv:1902.10584 (2019)"},{"issue":"1","key":"22_CR22","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1177\/1103308817697240","volume":"26","author":"L Vandenbossche","year":"2018","unstructured":"Vandenbossche, L., Spruyt, B., Keppens, G.: Young, innocent and sexist? Social differences in benevolent and hostile sexist attitudes towards women amongst flemish adolescents. Young 26(1), 51\u201369 (2018). https:\/\/doi.org\/10.1177\/1103308817697240","journal-title":"Young"},{"key":"22_CR23","doi-asserted-by":"crossref","unstructured":"Waseem, Z., Hovy, D.: Hateful symbols or hateful people? predictive features for hate speech detection on twitter. In: Proceedings of the NAACL student research workshop, pp. 88\u201393 (2016)","DOI":"10.18653\/v1\/N16-2013"},{"key":"22_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1007\/978-3-642-35289-8_34","volume-title":"Neural Networks: Tricks of the Trade","author":"J Weston","year":"2012","unstructured":"Weston, J., Ratle, F., Mobahi, H., Collobert, R.: Deep learning via semi-supervised embedding. In: Montavon, G., Orr, G.B., M\u00fcller, K.-R. (eds.) Neural Networks: Tricks of the Trade. LNCS, vol. 7700, pp. 639\u2013655. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-35289-8_34"},{"key":"22_CR25","first-page":"81","volume":"54","author":"C White","year":"2018","unstructured":"White, C.: Atlantic geoscience society abstracts: 44th annual colloquium and general meeting 2018. Atlantic Geol. J. Atlantic Geosci. Soc.\/Atlantic Geol. Revue de la Soci\u00e9t\u00e9 G\u00e9oscientifique de l\u2019Atlantique 54, 81\u2013132 (2018)","journal-title":"Atlantic Geol. J. Atlantic Geosci. Soc.\/Atlantic Geol. Revue de la Soci\u00e9t\u00e9 G\u00e9oscientifique de l\u2019Atlantique"}],"container-title":["Communications in Computer and Information Science","Machine Learning and Knowledge Discovery in Databases"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-43887-6_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T01:06:37Z","timestamp":1707786397000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-43887-6_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030438869","9783030438876"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-43887-6_22","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"28 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECML PKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Joint European Conference on Machine Learning and Knowledge Discovery in Databases","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"W\u00fcrzburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ecml2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ecmlpkdd2019.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Microsoft CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"733","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"130","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.04","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5.3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"ECML PKDD Workshops Information: single-blind review, submissions: 200, full papers accepted: 70, short papers accepted: 46","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}