{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T14:00:28Z","timestamp":1760623228500,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030835262"},{"type":"electronic","value":"9783030835279"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-83527-9_12","type":"book-chapter","created":{"date-parts":[[2021,8,29]],"date-time":"2021-08-29T23:04:59Z","timestamp":1630278299000},"page":"135-146","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Exploring Conditional Language Model Based Data Augmentation Approaches for Hate Speech\u00a0Classification"],"prefix":"10.1007","author":[{"given":"Ashwin Geet","family":"D\u2019Sa","sequence":"first","affiliation":[]},{"given":"Irina","family":"Illina","sequence":"additional","affiliation":[]},{"given":"Dominique","family":"Fohr","sequence":"additional","affiliation":[]},{"given":"Dietrich","family":"Klakow","sequence":"additional","affiliation":[]},{"given":"Dana","family":"Ruiter","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,30]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Anaby-Tavor, A., et al.: Do not have enough data? Deep learning to the rescue! In: AAAI, pp. 7383\u20137390 (2020)","DOI":"10.1609\/aaai.v34i05.6233"},{"key":"12_CR2","unstructured":"Aroyehun, S.T., Gelbukh, A.: Aggression detection in social media: using deep neural networks, data augmentation, and pseudo labeling. In: Proceedings of the First Workshop on Trolling, Aggression and Cyberbullying (TRAC-2018), pp. 90\u201397 (2018)"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Badjatiya, P., Gupta, S., Gupta, M., Varma, V.: Deep learning for hate speech detection in tweets. In: Proceedings of the 26th International Conference on World Wide Web Companion, pp. 759\u2013760 (2017)","DOI":"10.1145\/3041021.3054223"},{"key":"12_CR4","first-page":"1137","volume":"3","author":"Y Bengio","year":"2003","unstructured":"Bengio, Y., Ducharme, R., Vincent, P., Janvin, C.: A neural probabilistic language model. J. Mach. Learn. Res. 3, 1137\u20131155 (2003)","journal-title":"J. Mach. Learn. Res."},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Cao, R., Lee, R.K.W., Hoang, T.A.: DeepHate: hate speech detection via multi-faceted text representations. In: 12th ACM Conference on Web Science, pp. 11\u201320 (2020)","DOI":"10.1145\/3394231.3397890"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Davidson, T., Warmsley, D., Macy, M., Weber, I.: Automated hate speech detection and the problem of offensive language. In: Eleventh International AAAI Conference on Web and Social Media (2017)","DOI":"10.1609\/icwsm.v11i1.14955"},{"key":"12_CR7","first-page":"319","volume":"49","author":"R Delgado","year":"2014","unstructured":"Delgado, R., Stefancic, J.: Hate speech in cyberspace. Wake Forest L. Rev. 49, 319 (2014)","journal-title":"Wake Forest L. Rev."},{"key":"12_CR8","unstructured":"Devlin, J., Chang, M.W., Lee, K., Toutanova, K.: Bert: pre-training of deep bidirectional transformers for language understanding. In: Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Volume 1 (Long and Short Papers), pp. 4171\u20134186 (2019)"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Dror, R., Baumer, G., Shlomov, S., Reichart, R.: The Hitchhiker\u2019s guide to testing statistical significance in natural language processing. In: Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), vol. 1, pp. 1383\u20131392 (2018)","DOI":"10.18653\/v1\/P18-1128"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"D\u2019Sa, A.G., Illina, I., Fohr, D.: Bert and fasttext embeddings for automatic detection of toxic speech. In: 2020 International Multi-Conference on: \u201cOrganization of Knowledge and Advanced Technologies\u201d (OCTA), pp. 1\u20135 (2020)","DOI":"10.1109\/OCTA49274.2020.9151853"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Efron, B., Tibshirani, R.J.: An Introduction to the Bootstrap. CRC Press (1994)","DOI":"10.1201\/9780429246593"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Founta, A.M., et al.: Large scale crowdsourcing and characterization of twitter abusive behavior. In: Twelfth International AAAI Conference on Web and Social Media (2018)","DOI":"10.1609\/icwsm.v12i1.14991"},{"key":"12_CR13","unstructured":"Hu, Z., Yang, Z., Liang, X., Salakhutdinov, R., Xing, E.P.: Toward controlled generation of text. In: International Conference on Machine Learning, pp. 1587\u20131596. PMLR (2017)"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Isaksen, V., Gamb\u00e4ck, B.: Using transfer-based language models to detect hateful and offensive language online. In: Proceedings of the Fourth Workshop on Online Abuse and Harms, pp. 16\u201327 (2020)","DOI":"10.18653\/v1\/2020.alw-1.3"},{"key":"12_CR15","unstructured":"Keskar, N.S., McCann, B., Varshney, L.R., Xiong, C., Socher, R.: CTRL: a conditional transformer language model for controllable generation. arXiv preprint arXiv:1909.05858 (2019)"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Kobayashi, S.: Contextual augmentation: data augmentation by words with paradigmatic relations. In: Proceedings of the 2018 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Volume 2 (Short Papers), pp. 452\u2013457 (2018)","DOI":"10.18653\/v1\/N18-2072"},{"issue":"2","key":"12_CR17","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1080\/0952813X.2017.1409284","volume":"30","author":"S Malmasi","year":"2018","unstructured":"Malmasi, S., Zampieri, M.: Challenges in discriminating profanity from hate speech. J. Exp. Theor. Artif. Intell. 30(2), 187\u2013202 (2018)","journal-title":"J. Exp. Theor. Artif. Intell."},{"issue":"8","key":"12_CR18","first-page":"9","volume":"1","author":"A Radford","year":"2019","unstructured":"Radford, A., Wu, J., Child, R., Luan, D., Amodei, D., Sutskever, I.: Language models are unsupervised multitask learners. OpenAI Blog 1(8), 9 (2019)","journal-title":"OpenAI Blog"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Rizos, G., Hemker, K., Schuller, B.: Augment to prevent: short-text data augmentation in deep learning for hate-speech classification. In: Proceedings of the 28th ACM International Conference on Information and Knowledge Management, pp. 991\u20131000 (2019)","DOI":"10.1145\/3357384.3358040"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Sennrich, R., Haddow, B., Birch, A.: Improving neural machine translation models with monolingual data. In: Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), pp. 86\u201396 (2016)","DOI":"10.18653\/v1\/P16-1009"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Sharifirad, S., Jafarpour, B., Matwin, S.: Boosting text classification performance on sexist tweets by text augmentation and text generation using a combination of knowledge graphs. In: Proceedings of the 2nd Workshop on Abusive Language Online (ALW2), pp. 107\u2013114 (2018)","DOI":"10.18653\/v1\/W18-5114"},{"key":"12_CR22","unstructured":"Shleifer, S.: Low resource text classification with ULMFIT and backtranslation. arXiv preprint arXiv:1903.09244 (2019)"},{"key":"12_CR23","doi-asserted-by":"crossref","unstructured":"Wang, W.Y., Yang, D.: That\u2019s so annoying!!!: a lexical and frame-semantic embedding based data augmentation approach to automatic categorization of annoying behaviors using# petpeeve tweets. In: Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, pp. 2557\u20132563 (2015)","DOI":"10.18653\/v1\/D15-1306"},{"key":"12_CR24","doi-asserted-by":"crossref","unstructured":"Wei, J., Zou, K.: EDA: easy data augmentation techniques for boosting performance on text classification tasks. In: Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP), pp. 6383\u20136389 (2019)","DOI":"10.18653\/v1\/D19-1670"},{"key":"12_CR25","unstructured":"Wolf, T., et al.: Transformers: state-of-the-art natural language processing. In: Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing: System Demonstrations, pp. 38\u201345. Association for Computational Linguistics, Online, October 2020"},{"key":"12_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-030-22747-0_7","volume-title":"Computational Science \u2013 ICCS 2019","author":"X Wu","year":"2019","unstructured":"Wu, X., Lv, S., Zang, L., Han, J., Hu, S.: Conditional BERT contextual augmentation. In: Rodrigues, J., et al. (eds.) ICCS 2019. LNCS, vol. 11539, pp. 84\u201395. Springer, Conditional bert contextual augmentation (2019). https:\/\/doi.org\/10.1007\/978-3-030-22747-0_7"},{"key":"12_CR27","first-page":"1","volume":"25","author":"T Wullach","year":"2020","unstructured":"Wullach, T., Amir, A., Einat, M.: Towards hate speech detection at large via deep generative modeling. IEEE Internet Comput. 25, 1 (2020)","journal-title":"IEEE Internet Comput."},{"key":"12_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"745","DOI":"10.1007\/978-3-319-93417-4_48","volume-title":"The Semantic Web","author":"Z Zhang","year":"2018","unstructured":"Zhang, Z., Robinson, D., Tepper, J.: Detecting hate speech on Twitter using a convolution-GRU based deep neural network. In: Gangemi, A., et al. (eds.) ESWC 2018. LNCS, vol. 10843, pp. 745\u2013760. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-93417-4_48"}],"container-title":["Lecture Notes in Computer Science","Text, Speech, and Dialogue"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-83527-9_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,8]],"date-time":"2023-01-08T07:41:50Z","timestamp":1673163710000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-83527-9_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030835262","9783030835279"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-83527-9_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"30 August 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"TSD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Text, Speech, and Dialogue","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Olomouc","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Czech Republic","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"tsd2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.kiv.zcu.cz\/tsd2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"TSDEngine 3.2","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"101","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,93","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}