{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T23:09:21Z","timestamp":1768518561419,"version":"3.49.0"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030604493","type":"print"},{"value":"9783030604509","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-60450-9_54","type":"book-chapter","created":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T15:18:51Z","timestamp":1601911131000},"page":"683-696","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Aggressive Language Detection with Joint Text Normalization via Adversarial Multi-task Learning"],"prefix":"10.1007","author":[{"given":"Shengqiong","family":"Wu","sequence":"first","affiliation":[]},{"given":"Hao","family":"Fei","sequence":"additional","affiliation":[]},{"given":"Donghong","family":"Ji","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,2]]},"reference":[{"key":"54_CR1","doi-asserted-by":"crossref","unstructured":"Badjatiya, P., Gupta, S., Gupta, M., Varma, V.: Deep learning for hate speech detection in tweets. In: Proceedings of the International Conference on World Wide Web Companion, pp. 759\u2013760 (2017)","DOI":"10.1145\/3041021.3054223"},{"key":"54_CR2","doi-asserted-by":"crossref","unstructured":"Baldwin, T., de Marneffe, M.C., Han, B., Kim, Y.B., Ritter, A., Xu, W.: Shared tasks of the 2015 workshop on noisy user-generated text: twitter lexical normalization and named entity recognition. In: Proceedings of the Workshop on Noisy User-generated Text, pp. 126\u2013135 (2015)","DOI":"10.18653\/v1\/W15-4319"},{"key":"54_CR3","doi-asserted-by":"crossref","unstructured":"Brassard-Gourdeau, E., Khoury, R.: Subversive toxicity detection using sentiment information. In: Proceedings of the Workshop on Abusive Language Online, pp. 1\u201310 (2019)","DOI":"10.18653\/v1\/W19-3501"},{"key":"54_CR4","doi-asserted-by":"crossref","unstructured":"Cimino, A., De Mattei, L., Dell\u2019Orletta, F.: Multi-task learning in deep neural networks at evalita 2018. In: Proceedings of the Wvaluation Campaign of Natural Language Processing and Speech tools for Italian, pp. 86\u201395 (2018)","DOI":"10.4000\/books.aaccademia.4527"},{"key":"54_CR5","doi-asserted-by":"crossref","unstructured":"Davidson, T., Warmsley, D., Macy, M., Weber, I.: Automated hate speech detection and the problem of offensive language. In: Proceedings of International Conference on Web and Social Media, (2017)","DOI":"10.1609\/icwsm.v11i1.14955"},{"key":"54_CR6","unstructured":"Dehghani, M., Gouws, S., Vinyals, O., Uszkoreit, J., Kaiser, \u0141.: Universal transformers. arXiv preprint arXiv:1807.03819 (2018)"},{"key":"54_CR7","doi-asserted-by":"publisher","first-page":"1839","DOI":"10.1109\/TASLP.2020.3001390","volume":"28","author":"H Fei","year":"2020","unstructured":"Fei, H., Ji, D., Zhang, Y., Ren, Y.: Topic-enhanced capsule network for multi-label emotion classification. IEEE\/ACM Trans. Audio Speech Lang. Process. 28, 1839\u20131848 (2020)","journal-title":"IEEE\/ACM Trans. Audio Speech Lang. Process."},{"key":"54_CR8","doi-asserted-by":"crossref","unstructured":"Fei, H., Ren, Y., Ji, D.: Implicit objective network for emotion detection. In: Proceedings of the NLPCC, pp. 647\u2013659 (2019)","DOI":"10.1007\/978-3-030-32233-5_50"},{"issue":"6","key":"54_CR9","doi-asserted-by":"publisher","first-page":"102311","DOI":"10.1016\/j.ipm.2020.102311","volume":"57","author":"H Fei","year":"2020","unstructured":"Fei, H., Ren, Y., Ji, D.: Boundaries and edges rethinking: an end-to-end neural model for overlapping entity relation extraction. Inf. Process. Manage. 57(6), 102311 (2020)","journal-title":"Inf. Process. Manage."},{"key":"54_CR10","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1016\/j.ins.2019.10.065","volume":"513","author":"H Fei","year":"2020","unstructured":"Fei, H., Ren, Y., Ji, D.: Dispatched attention with multi-task learning for nested mention recognition. Inf. Sci. 513, 241\u2013251 (2020)","journal-title":"Inf. Sci."},{"key":"54_CR11","doi-asserted-by":"crossref","unstructured":"Fei, H., Zhang, M., Ji, D.: Cross-lingual semantic role labeling with high-quality translated training corpus. In: Proceedings of the ACL, pp. 7014\u20137026 (2020)","DOI":"10.18653\/v1\/2020.acl-main.627"},{"key":"54_CR12","doi-asserted-by":"crossref","unstructured":"Fei, H., Zhang, Y., Ren, Y., Ji, D.: Latent emotion memory for multi-label emotion classification. In: Proceedings of the AAAI, pp. 7692\u20137699 (2020)","DOI":"10.1609\/aaai.v34i05.6271"},{"key":"54_CR13","doi-asserted-by":"crossref","unstructured":"Gamb\u00e4ck, B., Sikdar, U.K.: Using convolutional neural networks to classify hate-speech. In: Proceedings of the Workshop on Abusive Language Online, pp. 85\u201390 (2017)","DOI":"10.18653\/v1\/W17-3013"},{"key":"54_CR14","doi-asserted-by":"crossref","unstructured":"Gao, S., Ramanathan, A., Tourassi, G.: Hierarchical convolutional attention networks for text classification. In: Proceedings of Workshop on Representation Learning for NLP, pp. 11\u201323 (2018)","DOI":"10.18653\/v1\/W18-3002"},{"key":"54_CR15","unstructured":"Hassan, H., Menezes, A.: Social text normalization using contextual graph random walks. In: Proceedings of the EMNLP, pp. 1577\u20131586 (2013)"},{"issue":"8","key":"54_CR16","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997)","journal-title":"Neural Comput."},{"key":"54_CR17","doi-asserted-by":"crossref","unstructured":"Kim, Y.: Convolutional neural networks for sentence classification. arXiv preprint arXiv:1408.5882 (2014)","DOI":"10.3115\/v1\/D14-1181"},{"key":"54_CR18","unstructured":"Kumar, R., Ojha, A.K., Malmasi, S., Zampieri, M.: Benchmarking aggression identification in social media. In: Proceedings of the Workshop on Trolling, Aggression and Cyberbullying, pp. 1\u201311 (2018)"},{"key":"54_CR19","doi-asserted-by":"crossref","unstructured":"Lai, S., Xu, L., Liu, K., Zhao, J.: Recurrent convolutional neural networks for text classification. In: Proceedings of AAAI, (2015)","DOI":"10.1609\/aaai.v29i1.9513"},{"key":"54_CR20","doi-asserted-by":"crossref","unstructured":"Lal, Y.K., Kumar, V., Dhar, M., Shrivastava, M., Koehn, P.: De-mixing sentiment from code-mixed text. In: Proceedings of the ACL, pp. 371\u2013377 (2019)","DOI":"10.18653\/v1\/P19-2052"},{"key":"54_CR21","unstructured":"Liu, P., Qiu, X., Huang, X.: Recurrent neural network for text classification with multi-task learning. arXiv preprint arXiv:1605.05101 (2016)"},{"key":"54_CR22","doi-asserted-by":"crossref","unstructured":"Liu, P., Qiu, X., Huang, X.: Adversarial multi-task learning for text classification. In: Proceedings of the ACL, pp. 1\u201310 (2017)","DOI":"10.18653\/v1\/P17-1001"},{"key":"54_CR23","unstructured":"Madisetty, S., Desarkar, M.S.: Aggression detection in social media using deep neural networks. In: Proceedings of the Workshop on Trolling, Aggression and Cyberbullying, pp. 120\u2013127 (2018)"},{"key":"54_CR24","unstructured":"Nikhil, N., Pahwa, R., Nirala, M.K., Khilnani, R.: Lstms with attention for aggression detection. In: Proceedings of the Workshop on Trolling, Aggression and Cyberbullying, pp. 52\u201357 (2018)"},{"key":"54_CR25","unstructured":"Peters, M.E., et al.: Deep contextualized word representations. arXiv preprint arXiv:1802.05365 (2018)"},{"key":"54_CR26","unstructured":"Ramiandrisoa, F., Mothe, J.: Irit at trac 2018. In: Proceedings of the Workshop on Trolling, Aggression and Cyberbullying, pp. 19\u201327 (2018)"},{"key":"54_CR27","doi-asserted-by":"crossref","unstructured":"Schmidt, A., Wiegand, M.: A survey on hate speech detection using natural language processing. In: Proceedings of the International Workshop on Natural Language Processing for Social Media, pp. 1\u201310 (2017)","DOI":"10.18653\/v1\/W17-1101"},{"key":"54_CR28","doi-asserted-by":"crossref","unstructured":"Vaidya, A., Mai, F., Ning, Y.: Empirical analysis of multi-task learning for reducing model bias in toxic comment detection. arXiv preprint arXiv:1909.09758 (2019)","DOI":"10.1609\/icwsm.v14i1.7334"},{"key":"54_CR29","unstructured":"Vaswani, A., et al.: Attention is all you need. In: Proceedings of the NeurIPS, pp. 5998\u20136008 (2017)"},{"key":"54_CR30","doi-asserted-by":"crossref","unstructured":"Wulczyn, E., Thain, N., Dixon, L.: Ex machina: personal attacks seen at scale. In: Proceedings of the International Conference on World Wide Web, pp. 1391\u20131399 (2017)","DOI":"10.1145\/3038912.3052591"},{"key":"54_CR31","unstructured":"Yang, Y., Eisenstein, J.: A log-linear model for unsupervised text normalization. In: Proceedings of the ACL, pp. 61\u201372 (2013)"},{"key":"54_CR32","doi-asserted-by":"crossref","unstructured":"Zampieri, M., Malmasi, S., Nakov, P., Rosenthal, S., Farra, N., Kumar, R.: SemEval-2019 task 6: identifying and categorizing offensive language in social media (OffensEval). In: Proceedings of the International Workshop on Semantic Evaluation, pp. 75\u201386 (2019)","DOI":"10.18653\/v1\/S19-2010"},{"key":"54_CR33","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Robinson, D., Tepper, J.: Detecting hate speech on twitter using a convolution-gru based deep neural network. In: Proceedings of European Semantic Web Conference, pp. 745\u2013760 (2018)","DOI":"10.1007\/978-3-319-93417-4_48"},{"key":"54_CR34","doi-asserted-by":"crossref","unstructured":"Zhou, J.T., et al.: Dual adversarial neural transfer for low-resource named entity recognition. In: Proceedings of the ACL, pp. 3461\u20133471 (2019)","DOI":"10.18653\/v1\/P19-1336"}],"container-title":["Lecture Notes in Computer Science","Natural Language Processing and Chinese Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-60450-9_54","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,22]],"date-time":"2022-11-22T05:33:30Z","timestamp":1669095210000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-60450-9_54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030604493","9783030604509"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-60450-9_54","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"2 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NLPCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"CCF International Conference on Natural Language Processing and Chinese Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Zhengzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nlpcc2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/tcci.ccf.org.cn\/conference\/2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Softconf","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"320","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"100","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}