{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T22:40:11Z","timestamp":1756075211968,"version":"3.44.0"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030854461"},{"type":"electronic","value":"9783030854478"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-85447-8_55","type":"book-chapter","created":{"date-parts":[[2021,8,24]],"date-time":"2021-08-24T19:05:04Z","timestamp":1629831904000},"page":"670-680","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Deep Multi-modal Neural Network for the Identification of Hate Speech from Social Media"],"prefix":"10.1007","author":[{"given":"Gunjan","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Jyoti Prakash","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Abhinav","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,25]]},"reference":[{"key":"55_CR1","doi-asserted-by":"publisher","first-page":"103411","DOI":"10.1016\/j.im.2020.103411","volume":"58","author":"TK Chan","year":"2020","unstructured":"Chan, T.K., Cheung, C.M., Lee, Z.W.: Cyberbullying on social networking sites: a literature review and future research directions. Inf. Manag. 58, 103411 (2020)","journal-title":"Inf. Manag."},{"key":"55_CR2","doi-asserted-by":"crossref","unstructured":"Cheng, L., Li, J., Silva, Y.N., Hall, D.L., Liu, H.: Xbully: cyberbullying detection within a multi-modal context. In: Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining, pp. 339\u2013347 (2019)","DOI":"10.1145\/3289600.3291037"},{"key":"55_CR3","doi-asserted-by":"crossref","unstructured":"Gomez, R., Gibert, J., Gomez, L., Karatzas, D.: Exploring hate speech detection in multimodal publications. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision, pp. 1470\u20131478 (2020)","DOI":"10.1109\/WACV45572.2020.9093414"},{"key":"55_CR4","doi-asserted-by":"publisher","unstructured":"Kim, Y.: Convolutional neural networks for sentence classification. In: Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP), pp. 1746\u20131751. ACL (2014). https:\/\/doi.org\/10.3115\/v1\/D14-1181","DOI":"10.3115\/v1\/D14-1181"},{"key":"55_CR5","series-title":"Smart Innovation, Systems and Technologies","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-3-319-30927-9_20","volume-title":"Proceedings of First International Conference on Information and Communication Technology for Intelligent Systems: Volume 2","author":"A Kumar","year":"2016","unstructured":"Kumar, A., Rathore, N.C.: Relationship strength based access control in online social networks. In: Satapathy, S Chandra, Das, S. (eds.) Proceedings of First International Conference on Information and Communication Technology for Intelligent Systems: Volume 2. SIST, vol. 51, pp. 197\u2013206. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-30927-9_20"},{"key":"55_CR6","unstructured":"Kumar, A., Saumya, S., Singh, J.P.: NITP-AI-NLP@ HASOC-FIRE2020: fine tuned BERT for the hate speech and offensive content identification from social media. FIRE (Working Notes), CEUR (2020)"},{"key":"55_CR7","unstructured":"Kumar, A., Saumya, S., Singh, J.P.: Nitp-ainlp@ hasoc-dravidian-codemix- fire2020: A machine learning approach to identify offensive languages from dravidian code-mixed text. FIRE (Working Notes), CEUR (2020)"},{"key":"55_CR8","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1016\/j.ijdrr.2018.10.021","volume":"33","author":"A Kumar","year":"2019","unstructured":"Kumar, A., Singh, J.P.: Location reference identification from tweets during emergencies: a deep learning approach. Int. J. Disaster Risk Reduct. 33, 365\u2013375 (2019)","journal-title":"Int. J. Disaster Risk Reduct."},{"key":"55_CR9","doi-asserted-by":"crossref","unstructured":"Kumar, A., Singh, J.P., Dwivedi, Y.K., Rana, N.P.: A deep multi-modal neural network for informative twitter content classification during emergencies. Ann. Oper. Res., 1\u201332 (2020)","DOI":"10.1007\/s10479-020-03514-x"},{"key":"55_CR10","unstructured":"Kumari, K., Singh, J.P.: AI ML NIT Patna at HASOC 2019: deep learning approach for identification of abusive content. In: FIRE (Working Notes). vol. 2517, pp. 328\u2013335 (2019)"},{"key":"55_CR11","unstructured":"Kumari, K., Singh, J.P.: AI ML NIT Patna@ TRAC-2: deep learning approach for multi-lingual aggression identification. In: Proceedings of the Second Workshop on Trolling, Aggression and Cyberbullying, pp. 113\u2013119 (2020)"},{"issue":"2","key":"55_CR12","doi-asserted-by":"crossref","first-page":"e3907","DOI":"10.1002\/ett.3907","volume":"32","author":"K Kumari","year":"2021","unstructured":"Kumari, K., Singh, J.P.: Identification of cyberbullying on multi-modal social media posts using genetic algorithm. Trans. Emerg. Telecommun. Technol. 32(2), e3907 (2021)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"55_CR13","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/j.future.2021.01.014","volume":"118","author":"K Kumari","year":"2021","unstructured":"Kumari, K., Singh, J.P., Dwivedi, Y.K., Rana, N.P.: Multi-modal aggression identification using convolutional neural network and binary particle swarm optimization. Futur. Gener. Comput. Syst. 118, 187\u2013197 (2021)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"15","key":"55_CR14","doi-asserted-by":"publisher","first-page":"11059","DOI":"10.1007\/s00500-019-04550-x","volume":"24","author":"K Kumari","year":"2020","unstructured":"Kumari, K., Singh, J.P., Dwivedi, Y.K., Rana, N.P.: Towards cyberbullying-free social media in smart cities: a unified multi-modal approach. Soft. Comput. 24(15), 11059\u201311070 (2020). https:\/\/doi.org\/10.1007\/s00500-019-04550-x","journal-title":"Soft. Comput."},{"key":"55_CR15","doi-asserted-by":"crossref","unstructured":"Paul, S., Saha, S., Hasanuzzaman, M.: Identification of cyberbullying: a deep learning based multimodal approach. Multimedia Tools Appl., 1\u201320 (2020)","DOI":"10.1007\/s11042-020-09631-w"},{"issue":"1","key":"55_CR16","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/TAFFC.2017.2761757","volume":"11","author":"S Salawu","year":"2017","unstructured":"Salawu, S., He, Y., Lumsden, J.: Approaches to automated detection of cyberbullying: a survey. IEEE Trans. Affect. Comput. 11(1), 3\u201324 (2017)","journal-title":"IEEE Trans. Affect. Comput."},{"key":"55_CR17","doi-asserted-by":"crossref","unstructured":"Schmidt, A., Wiegand, M.: A survey on hate speech detection using natural language processing. In: Proceedings of the Fifth International Workshop on Natural Language Processing for Social Media, pp. 1\u201310 (2017)","DOI":"10.18653\/v1\/W17-1101"},{"key":"55_CR18","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)"},{"key":"55_CR19","doi-asserted-by":"crossref","unstructured":"Wang, K., Xiong, Q., Wu, C., Gao, M., Yu, Y.: Multi-modal cyberbullying detection on social networks. In: 2020 International Joint Conference on Neural Networks (IJCNN), pp. 1\u20138. IEEE (2020)","DOI":"10.1109\/IJCNN48605.2020.9206663"},{"key":"55_CR20","doi-asserted-by":"crossref","unstructured":"Yang, F., et al.: Exploring deep multimodal fusion of text and photo for hate speech classification. In: Proceedings of the Third Workshop on Abusive Language Online, pp. 11\u201318 (2019)","DOI":"10.18653\/v1\/W19-3502"}],"container-title":["Lecture Notes in Computer Science","Responsible AI and Analytics for an Ethical and Inclusive Digitized Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-85447-8_55","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T22:03:40Z","timestamp":1756073020000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-85447-8_55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030854461","9783030854478"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-85447-8_55","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"25 August 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"I3E","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Conference on e-Business, e-Services and e-Society","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Galway","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ireland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"i3e2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.i3e2021.com\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"141","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"57","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}